Virtualization Technology News and Information
White Papers
RSS
White Papers Search Results
Showing 17 - 23 of 23 white papers, page 2 of 2.
How to Plan for Disaster Recovery
Disaster recovery scenario planning begins with identifying potential business interruption events. If you understand what the risks are, you can formulate a strategy of how to deal with them and mitigate, or at least limit, business impact. Once the disaster recovery scenarios are identified, the planning phase commences. This involves determining the probability of each scenario occurring and documenting the recovery operations.
Disaster recovery scenario planning begins with identifying potential business interruption events. If you understand what the risks are, you can formulate a strategy of how to deal with them and mitigate, or at least limit, business impact. Once the disaster recovery scenarios are identified, the planning phase commences. This involves determining the probability of each scenario occurring and documenting the recovery operations.
 
Although no prevention method is 100% fool proof, risk avoidance and taking proactive measures for preparedness are essential elements of the disaster recovery process. Still despite all the measures you take to avoid a disaster, you must assume that a disaster will happen. Having this mind-set will help shape your decisions when it comes to planning for IT disaster recovery.
DR 101 EBook
Disaster Recovery 101: Everything you wanted to know about DR….but were afraid to ask!
Confused about RTOs and RPOs? Fuzzy about failover and failback? Wondering about the advantages of continuous replication over snapshots? Well, you’re in the right place. The Disaster Recovery 101 guide will help you learn about DR from the ground up and assist you in making informed decisions when implementing your DR strategy, enabling you to build a resilient IT infrastructure.

This 101 guide will educate you on topics like:
  • How to evaluate replication technologies
  • Measuring the cost of downtime
  • How to test your Disaster Recovery plan
  • Reasons why backup isn’t Disaster Recovery
  • Tips for leveraging the cloud
  • Mitigating IT threats like ransomware
Remove complexity in protecting your virtual infrastructure with IBM Spectrum Protect Plus
This white paper focuses on the deployment and basic setup of IBM Spectrum Protect Plus for protecting VMware. Readers will be taken through a step-by-step explanation of what is required to install and configure IBM Spectrum Protect Plus for basic backup and recovery of VMware virtual machines (VMs). Integration with Spectrum Protect for long-term data retention is also discussed.
IBM Spectrum Protect™ Plus is a new data protection and availability solution for virtual environments that can unlock your valuable data for emerging use cases. You can deploy it in minutes and have your environment fully protected within an hour. IBM Spectrum Protect Plus can be implemented as a stand-alone solution or can integrate easily with your IBM Spectrum Protect environment to off-load copies for long-term storage and governance with scale and efficiency.

This white paper focuses on the deployment and basic setup of IBM Spectrum Protect Plus for protecting VMware. Readers will be taken through a step-by-step explanation of what is required to install and configure IBM Spectrum Protect Plus for basic backup and recovery of VMware virtual machines (VMs). Integration with Spectrum Protect for long-term data retention is also discussed.
ESG Lab Review: Protecting Virtual Environments with Spectrum Protect Plus from IBM
This ESG Lab Review documents hands-on validation of the IBM Spectrum Protect Plus solution with a focus on how IBM makes deployment and management easy, while delivering multi-workflow recovery agility.
Even today, the reliable protection and recovery of virtual environments continues to be a daunting task for many IT organizations. That said, backup and recovery software does not always make VM protection and recovery easy. As an example, and perhaps most alarmingly, one in nine VM recoveries fails because the data was never backed up. When looking into why VM recoveries fail, one finds a startling range of causes. With so many challenges—the less-than-perfect track records of IT organizations when it comes to VM protection, coupled with failures to meet modern-day SLAs—it is not surprising that some respondents report they continue to lack complete confidence in their VM protection and recovery solution.

It’s apparent through the introduction of the Spectrum Protect Plus solution that these challenges have not been ignored by IBM. Now IBM customers can quickly and easily deploy a solution specifically designed to meet the challenges of virtual machine data protection and administration.
The Next Generation Clusterless Federation Design in the Cloudistics Cloud Platform
Is there another way to manage your VMs? Yes, the introduction of the Cloudistics Cloud Platform has an innovative approach – non-clustered (or clusterless) federated design.The clusterless federation of the Cloudistics Cloud platform uses categories and tags to characterize computer nodes, migration zones, and storage groups (or blocks). With these benefits: ⦁ Node Limits Are A Thing of the Past. ⦁ Locking limitations are removed. ⦁ Flexibility is Enhanced. ⦁ Ladders of Latency are Removed. ⦁

This paper is written in the context of modern virtualized infrastructures, such as VMware or Nutanix. In such systems, a hypervisor runs on each compute node creating multiple virtual machines (VMs) per compute node. A guest OS runs inside each VM.

Data associated with each VM is stored in one or more virtual disks (vDisks). A virtual disk appears like a local disk, but can be mapped to physical storage in many ways as we will discuss.

Virtualized infrastructures use clustering to provide for non-disruptive VM migration between compute nodes, for load balancing across the nodes, for sharing storage, and for high availability and failover. Clustering is well known and has been used to build
computer systems for a long time. However, in the context of virtualized infrastructures, clustering has a number of significant limitations. Specifically, as we explain below, clusters limit scalability, decrease resource efficiency, hurt performance, reduce flexibility and impair manageability.

In this paper, we will present an innovative alternative architecture that does not have these limitations of clustering. We call our new approach clusterless federation and it is the approach used in the Cloudistics platform.

The rest of this paper is organized as follows. In Section 2, we describe the limitations of clustering and in Section 3, we drive the point home by using the specific example of VMware; other virtualized systems are similar. In Section 4, we present the clusterless federated approach and show how it avoids the limitations of clustering. We summarize in Section 5.

High Availability Clusters in VMware vSphere without Sacrificing Features or Flexibility
This paper explains the challenges of moving important applications from traditional physical servers to virtualized environments, such as VMware vSphere in order to take advantage of key benefits such as configuration flexibility, data and application mobility, and efficient use of IT resources and highlights six key facts you should know about HA protection in VMware vSphere environments that can save you money.

Many large enterprises are moving important applications from traditional physical servers to virtualized environments, such as VMware vSphere in order to take advantage of key benefits such as configuration flexibility, data and application mobility, and efficient use of IT resources.

Realizing these benefits with business critical applications, such as SQL Server or SAP can pose several challenges. Because these applications need high availability and disaster recovery protection, the move to a virtual environment can mean adding cost and complexity and limiting the use of important VMware features. This paper explains these challenges and highlights six key facts you should know about HA protection in VMware vSphere environments that can save you money.

Cisco UCS B-Series Best Practice & Deployment Guide
Topics: Tintri, Cisco UCS
This guide describes the Tintri best practices for a UCS environment with VMware. Tintri recommends cabling the VMstore such that one port on each controller is configured on each UCS fabric. Fabric A is configured to preferentially carry storage traffic under normal operating conditions.
Cisco UCS B-Series Blade Servers are a popular server choice. A typical UCS configuration includes a Fabric Interconnect (FI) with two separate fabrics, and there are some important considerations for configuring Tintri VMstore storage systems in the UCS environment.

This guide describes the Tintri best practices for a UCS environment with VMware. Tintri recommends cabling the VMstore such that one port on each controller is configured on each UCS fabric. Fabric A is configured to preferentially carry storage traffic under normal operating conditions.

Distributed virtual switching (dvSwitch) is described as the best practice for switching in the VMware environment. However, a separate appendix describes the configuration of vstandard switching.

Additional appendices describe design considerations for LACP, native VLAN use, and jumbo frames as well as configuration for the Cisco Nexus 5K switch.