You are on page 1of 80

Welcome to EMC Data Domain Operating System 5.2 Software Differences.

Click the Notes tab to view text that corresponds to the audio recording.
Click the Supporting Materials tab to download a PDF version of this eLearning.

Copyright © 1996, 2000, 2001, 2002, 2003, 2004, 2005, 2006, 2007, 2008, 2009, 2010, 2011, 2012 EMC Corporation. All Rights Reserved. EMC
believes the information in this publication is accurate as of its publication date. The information is subject to change without notice.
THE INFORMATION IN THIS PUBLICATION IS PROVIDED “AS IS.” EMC CORPORATION MAKES NO REPRESENTATIONS OR WARRANTIES OF ANY
KIND WITH RESPECT TO THE INFORMATION IN THIS PUBLICATION, AND SPECIFICALLY DISCLAIMS IMPLIED WARRANTIES OF MERCHANTABILITY
OR FITNESS FOR A PARTICULAR PURPOSE.

Use, copying, and distribution of any EMC software described in this publication requires an applicable software license.
EMC2, EMC, Data Domain, RSA, EMC Centera, EMC ControlCenter, EMC LifeLine, EMC OnCourse, EMC Proven, EMC Snap, EMC SourceOne,
EMC Storage Administrator, Acartus, Access Logix, AdvantEdge, AlphaStor, ApplicationXtender, ArchiveXtender, Atmos, Authentica, Authentic
Problems, Automated Resource Manager, AutoStart, AutoSwap, AVALONidm, Avamar, Captiva, Catalog Solution, C-Clip, Celerra, Celerra
Replicator, Centera, CenterStage, CentraStar, ClaimPack, ClaimsEditor, CLARiiON, ClientPak, Codebook Correlation Technology, Common
Information Model, Configuration Intelligence, Configuresoft, Connectrix, CopyCross, CopyPoint, Dantz, DatabaseXtender, Direct Matrix
Architecture, DiskXtender, DiskXtender 2000, Document Sciences, Documentum, elnput, E-Lab, EmailXaminer, EmailXtender, Enginuity,
eRoom, Event Explorer, FarPoint, FirstPass, FLARE, FormWare, Geosynchrony, Global File Virtualization, Graphic Visualization, Greenplum,
HighRoad, HomeBase, InfoMover, Infoscape, Infra, InputAccel, InputAccel Express, Invista, Ionix, ISIS, Max Retriever, MediaStor, MirrorView,
Navisphere, NetWorker, nLayers, OnAlert, OpenScale, PixTools, Powerlink, PowerPath, PowerSnap, QuickScan, Rainfinity, RepliCare, RepliStor,
ResourcePak, Retrospect, RSA, the RSA logo, SafeLine, SAN Advisor, SAN Copy, SAN Manager, Smarts, SnapImage, SnapSure, SnapView, SRDF,
StorageScope, SupportMate, SymmAPI, SymmEnabler, Symmetrix, Symmetrix DMX, Symmetrix VMAX, TimeFinder, UltraFlex, UltraPoint,
UltraScale, Unisphere, VMAX, Vblock, Viewlets, Virtual Matrix, Virtual Matrix Architecture, Virtual Provisioning, VisualSAN, VisualSRM,
Voyence, VPLEX, VSAM-Assist, WebXtender, xPression, xPresso, YottaYotta, the EMC logo, and where information lives, are registered
trademarks or trademarks of EMC Corporation in the United States and other countries.

All other trademarks used herein are the property of their respective owners.

© Copyright 2012 EMC Corporation. All rights reserved. Published in the USA.

Revision Date: 30/04/2012


Revision Number: MR-NWN-FDDOS52S

Copyright © 2012 EMC Corporation. Do not copy - All Rights Reserved. 1


Take a moment to review the course objectives.

Upon completion of this course, you will be able to:


• Describe key improvements made to the Data Invulnerability Architecture and the
filesystem
• Compare and contrast new software options with enhancements made to existing
license software options
• Recognize changes made to the CLI and GUI to support DD OS 5.2 features and
functions
• Summarize additional new features for integrating and maintaining DD OS 5.2 systems

Copyright © 2012 EMC Corporation. Do not copy - All Rights Reserved. 2


The course overview provides information about this course, the intended audience, and the
prerequisites. Review this information before proceeding.

The EMC Data Domain DD OS 5.2 Software Differences training course provides information
necessary to distinguish new DD OS 5.2 features with previous versions, both in terms of
software and hardware changes or updates. This course focuses on new software and related
updates.

This course is intended for EMC internal employees and partners such as EMC Solutions
Architects, Technical Consultants, Implementation Engineers, Technical Support Engineers and
others providing services and support for Data Domain systems.

The content is positioned to compare what’s new or different with existing features, functions,
and software. Due to this, prior experience with Data Domain technology and equipment is
assumed.

Before attending this course, you should have completed the following courses:
• EMC Data Domain Technology and Systems Introduction
• EMC Data Domain System Administration
• EMC Data Domain System Installation

Visit http://education.emc.com

Copyright © 2012 EMC Corporation. Do not copy - All Rights Reserved. 3


Here are the main modules in this course. The duration for each module is an estimate
because some modules have learner-controlled interactions in addition to chances to check
your knowledge as you progress through the course. Set aside at least two hours to fully
complete this training.

To get credit for completing this course you must pass an online exam with a score of 80% or
higher.

Copyright © 2012 EMC Corporation. Do not copy - All Rights Reserved. 4


Here are the objectives for this module. Take a moment to read each objective before
proceeding.

This module focuses on:


• Improvements made to the Data Invulnerability Architecture
• MTree Quotas for logical storage space accounting and enforcement
• Networking enhancements made for NFS statistics, IPv6 addressing, and checking
network congestion
• New Backup Operator role and the functions it can perform for system management

Copyright © 2012 EMC Corporation. Do not copy - All Rights Reserved. 5


This lesson covers changes made to the Data Invulnerability Architecture.

Copyright © 2012 EMC Corporation. Do not copy - All Rights Reserved. 6


Let’s start by comparing and contrasting speed and capacity information across the Data
Domain product family.

Note the addition of the DD990 storage system for large enterprises and new licenses for Data
Domain software options.

Copyright © 2012 EMC Corporation. Do not copy - All Rights Reserved. 7


Data Domain Data Invulnerability Architecture lays out the industry's best defense against data
integrity issues.

Data Invulnerability Architecture provides unprecedented levels of data protection, data


verification, and self-healing capabilities that are unavailable in conventional disk or tape
systems.

There are four key components:


• End-to-end verification
• Fault avoidance and containment
• Continuous fault detection and healing
• Recoverability

Several enhancements have been made to Data Invulnerability Architecture in the DD OS 5.2
release. Let’s take a closer look.

Copyright © 2012 EMC Corporation. Do not copy - All Rights Reserved. 8


Review the information in this table. For more detailed information see the Notes tab.

The main changes to the Data Invulnerability Architecture are:


1. Inline container verification – prior to 5.1, with online container verification we had background process to
verify containers soon after written to disc, but if errors occurred the backup jobs would have to be
repeated. Inline container verification identifies and corrects issues experienced anywhere in the I/O
system, including failures to memory, HBA, controllers or disk. Data integrity is verified after writing to
disk and before the data is released from memory/NVRAM. ICV captures and corrects I/O errors inline
during the backup process. The end user benefit of ICV is reducing the need to repeat backup jobs as a
result to failures in I/O during write and read operations.
2. Multi-threaded file verification – Currently files are verified after they are closed. There are two threads
verifying files using synchronous I/O, i.e., two I/O operations at a time. To verify files quickly, in 5.2 I/O
parallelism is increased from two threads to:
 8 for DD860
 16 for DD890
 32 for DD990
3. Multi-threaded scrubbing – new scrubbing algorithm includes more aggressive scrubbing while system is
idle. With DD OS 5.2, scrubbing of the active tier completes once in three weeks and the Extended
Retention tier (formerly called Archive tier) completes once per month.

Overall benefits to improvements in the Data Invulnerability Architecture include:


• Reducing the need to repeat backup jobs due to I/O errors during writes or reads (ICV)
• Improved cleaning performance (GC), and
• Increased Collection Replication throughput

Copyright © 2012 EMC Corporation. Do not copy - All Rights Reserved. 9


Let’s compare and contrast the design of Online Container Verification (OCV) with Inline Container Verification
(ICV).

OCV – Stabilizes containers on the disk platter, releases them from NVRAM, and then fully verifies them later by
reading back from disk.

ICV – Stabilizes containers on the disk platter and fully verifies them before releasing them from NVRAM.

Issues with Online Container Verification -


• Vulnerable to silent disk write failures including write cache vulnerabilities
• Inefficient
• Reads the data back after the disk head has moved to a different track
• Verifies a container almost twice (instead of just once)
• Single threaded and slow
• Complex
• Deals with failures after data is removed from NVRAM
• Maintains a separate thread for verification
• Involves interactions among container verification, Global Compression, and collection replication
• Trades off between verification and other activities

Performance Improvements with Inline Container Verification -


• No need to fully verify containers on replica (for collection replication)
• Increases the level of parallelism within the write path

Copyright © 2012 EMC Corporation. Do not copy - All Rights Reserved. 10


Due to the changes made in the Data Invulnerability Architecture, when using the command
line interface (CLI) to display system statistics and performance, the system state flags ‘V’ and
‘I’ are used in a new way.

State flag ‘V’ has changed:


• Previously, ‘V’ meant file verification + container verification + scrubbing were enabled
• Now, ‘V’ means that file verification is enabled

State flag ‘I’ is new:


• ‘I’ means scrubbing is enabled

The filesystem verify command also changed:


• ‘filesys verify suspend/resume’ now just suspends/resumes file verification
• ‘filesys verify suspend/resume all’ now suspends/resumes file verification + scrubbing

Copyright © 2012 EMC Corporation. Do not copy - All Rights Reserved. 11


This lesson covers changes made to the filesystem. These software enhancements do not
require any optional licenses, they come with overall enhancements made to the filesystem for
DD OS 5.2.

With DD OS 5.2, filesystem enhancements have been made in these areas:


Enterprise Consolidation Enhancement
• Introducing Logical MTree Quotas for logical storage space accounting and enforcement
Networking Enhancements
• Improved NFS system statistics
• Network Congestion Checker
• IPv6 Support
Security Enhancements (for non-licensed features)
• Role-based access control (RBAC):
 Backup Operator role added

Copyright © 2012 EMC Corporation. Do not copy - All Rights Reserved. 12


MTree quotas introduce an important enterprise consolidation feature in DD OS 5.2.

MTrees provide administrators a logical way to group their enterprise data, and with quotas,
administrators can control logical space targeted on a per-MTree basis.

MTree quotas are supported on all protocols:


• NFS and CIFS
• DD Boost Logical Storage Units (LSUs)
• VTL pools that are created as MTrees or converted to MTrees (not directory VTL pools)

Copyright © 2012 EMC Corporation. Do not copy - All Rights Reserved. 13


MTree Quotas can be useful in providing:
• Control over logical space in a multi-MTree environment
• A charge back mechanism in a service provider environment
• Ability to set just the quota soft limit in a backup environment so that:
 Backup jobs run overnight are not expected to fail
 An administrator is notified via an alert when a soft or hard quota limit is reached

Copyright © 2012 EMC Corporation. Do not copy - All Rights Reserved. 14


There are two kinds of quotas: soft and hard
• You can set either a soft or hard limit or both a soft and hard limit
 Valid configuration combinations are:
• Soft = none, Hard = none
• Soft = none, Hard = value
• Soft = value, Hard = value (soft value must be less than hard value)
• Soft = value, Hard = none
• Both values must be integers
• Soft value must be less than the hard value
• The /backup MTree does not support a hard limit, only a soft limit is allowed

Take a moment to review the information in the table before proceeding.

What happens if a limit is exceeded?


 With a soft limit an alert is sent when the MTree size exceeds the limit, but data can still be
written to it
 Quota alerts will clear once data is reduced on the MTree
 When a hard limit is set, data cannot be written to the MTree when the hard limit is
reached. Therefore, all copy and backup operations fail
 To allow backups to function, either reduce data in the MTree or increase the hard limit

Copyright © 2012 EMC Corporation. Do not copy - All Rights Reserved. 15


Take your time reviewing the features and functionality of quota limits as provided in this
summary.

Copyright © 2012 EMC Corporation. Do not copy - All Rights Reserved. 16


Review these factors that need to be taken into consideration before using MTree Quotas.

Copyright © 2012 EMC Corporation. Do not copy - All Rights Reserved. 17


Networking-related enhancements include:
• Improved NFS system statistics
• Network Congestion Checker utility
• IPv6 Support

Let’s take a closer look at each of these.

Copyright © 2012 EMC Corporation. Do not copy - All Rights Reserved. 18


Why the change?
The way statistics were collected is not valid anymore because of the architectural changes
made in DD OS 5.2.

These extended and improved statistics also allow administrators to better understand the NFS
clients’ read/write behavior, easing diagnosis of NFS performance issues.

Ops/s -- Operations per second


Load % -- Load percentage (pending ops/total RPC ops *100)
Data(MB/s – in/out) -- Protocol throughput
Wait(ms/MB – in/out) – Time spent to send/receive 1MB of data.

Copyright © 2012 EMC Corporation. Do not copy - All Rights Reserved. 19


The DD OS 5.2 release provides a new utility for insuring optimal system performance by
diagnosing causes of network congestion.

The Congestion Checker utility analyzes network performance and provides a means to identify
enhancements to reduce the impact of congestion to a system.
• In addition, the utility measures the effectiveness of the congestion avoidance
algorithm being used.
• It runs on a DD system at the customer's site in the customer's environment.
 Part of the analysis may require control of programs on both ends of the network
path.

Copyright © 2012 EMC Corporation. Do not copy - All Rights Reserved. 20


Here’s a summary of new commands for the new utility that checks network congestion. Use
and sample scenarios are also shown here. Congestion commands are normally run from the
source system. Take a moment to review this information.

Copyright © 2012 EMC Corporation. Do not copy - All Rights Reserved. 21


Here are a few examples that show both a basic and detailed output from the congestion
checker utility.

Copyright © 2012 EMC Corporation. Do not copy - All Rights Reserved. 22


IPv6 application support will be provided in future releases, the DD OS 5.2 release provides a
framework for IPv6:
• The system will respond to an IPv6 ping command
• Some output commands can display IPv6 information

Boundaries in this release:


• IPv6 is not supported for backup protocols or replication in this release
• The Enterprise Manager GUI provides minimal support for IPv6 addresses in this release
• The congestion checker does not support IPv6 addressing in this release

Copyright © 2012 EMC Corporation. Do not copy - All Rights Reserved. 23


Access control provides a degree of security and DD OS 5.2 introduces a new operator for Role-
Based Access Control (RBAC).

Copyright © 2012 EMC Corporation. Do not copy - All Rights Reserved. 24


Role-based access control is used to control user access to system objects and the actions they
are allowed to perform.

New for DD OS 5.2:


• The Backup Operator has been added to existing Administrator, User, Data Access, and
Security Officer roles.
• This new role provides the ability to perform backups with specific access rights and a
specific command set.

Copyright © 2012 EMC Corporation. Do not copy - All Rights Reserved. 25


Take your time reviewing the commands and operations available for the new Backup Operator
role.

Copyright © 2012 EMC Corporation. Do not copy - All Rights Reserved. 26


Take your time to click around in this content in the online module to learn more about role
permissions.

In compliance with the enhanced role-based access control (RBAC) policy, the roles of user,
security, and backup operator can run the following commands. Note that the data-access
role cannot run these commands.

For reset commands, only the admin role can reset other users. The security role cannot
reset other users. Users can reset their own keys.

Refer to the DD OS 5.2 Command Reference Guide from the support portal for details on
how to use these modified DD OS 5.2 CLI commands.

Copyright © 2012 EMC Corporation. Do not copy - All Rights Reserved. 27


Take a moment to review this summary of the key points covered in this module:
• Improvements made to the Data Invulnerability Architecture
• MTree Quotas for logical storage space accounting and enforcement
• Networking enhancements made for NFS statistics, IPv6 addressing, and checking
network congestion
• New Backup Operator role and the functions it can perform for system management

Copyright © 2012 EMC Corporation. Do not copy - All Rights Reserved. 28


Can you?
• Select three key improvements made to the Data Invulnerability Architecture.
• Choose the item that best describes how the design of Inline Container Verification
(ICV) works
• Choose which new feature allows administrators to control the logical space
consumed on a per-MTree basis
• Fill in the blank - which new role-based access control role provides users with the
specific ability to perform backups
• Select three correct statements regarding IPv6 support in DD OS 5.2

Copyright © 2012 EMC Corporation. Do not copy - All Rights Reserved. 29


This module covers licensed software option changes in DD OS 5.2
It is divided into two main areas of focus:
1. New Licensed Software Options
2. Enhanced Licensed Software Options

The module focuses on:


• The differences between the new DD Retention Lock Compliance and DD Retention
Lock Governance editions
• The renaming and repositioning of the product, formerly known as DD Archiver, which
is now known as the new DD Extended Retention software option
 Starting DD OS 5.2, DD Archiver is no longer a dedicated platform and is now known
as DD Extended Retention software option. DD Extended Retention software
option can be deployed on DD860 and DD990 platforms.
• Key enhancements made to DD Boost, DD Encryption, DD Virtual Tape Library, and DD
Replicator software options

Copyright © 2012 EMC Corporation. Do not copy - All Rights Reserved. 30


This lesson covers new licensed software options for DD OS 5.2.

Review the objectives for this lesson.

Upon completion of this lesson, you will be able to:


• Identify which software options are new for DD OS 5.2
• Describe the main features of each new option

Copyright © 2012 EMC Corporation. Do not copy - All Rights Reserved. 31


New Licensed Software Options

EMC Data Domain Retention Lock Compliance Software Edition


• New Compliance mode introduced in DD OS 5.2

EMC Data Domain Retention Lock Governance Software Edition


• Renaming of the existing Retention Lock to Retention Lock Governance

EMC Data Domain Extended Retention Software Option


• Software option for long-term retention of backup data
• Formerly known as “EMC Data Domain Archiver”
 License name listed on a system will continue to display as “Archiver” license

Copyright © 2012 EMC Corporation. Do not copy - All Rights Reserved. 32


DD Retention Lock Compliance Software Edition
A new software offering enabling users to apply strict retention requirements on archive data
per the data regulation standards such as SEC Rule 17a-4(f)
• Meets compliance requirements from both
US and International Regulatory Agencies:
 US Standards: SEC17a-4f, HIPAA, SOX, CFTC Rule 1.31b, FDA 21CFR
 International Standards: ISO Standard 15489-1, MoREQ-1
• Available on all Data Domain platforms except GDA
• Co-exists with backup data and applies different retention periods for different types of
archive data (file, email, etc.)
• Command line changes
 Refer to the DD OS 5.2 Command Reference Guide for specific details on how to
prepare and enable the system for Retention Lock Compliance

Copyright © 2012 EMC Corporation. Do not copy - All Rights Reserved. 33


DD Retention Lock Compliance Features
• Preserves archive data in a non-rewritable, non-erasable format
• Dual sign-on mechanism
 Requires a Security Officer to also sign-on to complete certain administrative
actions
• Secure Clock
 Prevents any data locked with the Retention Lock Compliance license from being
altered, mutilated, or destroyed
 Once Retention Lock Compliance is enabled it can not be disabled
• Audit Logging
• Granular Compliance
 Activate on an MTree to enable compliance capabilities on a portion of the system
 Replication support via collection replication only

If DD Retention Lock Compliance is enabled on a system, then as part of the compliance


requirements, it is necessary to have a secondary copy of the locked data on the destination
Data Domain system. For the DD OS 5.2 release, the only supported form of replication for data
locked with DD Retention Lock Compliance is collection replication. For replication, both
systems need to have DD Retention Lock Compliance enabled.

Copyright © 2012 EMC Corporation. Do not copy - All Rights Reserved. 34


EMC Data Domain Retention Lock Governance Software Edition
• Renaming of the existing Retention Lock to Retention Lock Governance software edition

The name is new but the functionality is the same as it was when it was known as DD
Retention Lock.

This is the option to use when your retention locking needs are not as stringent as complying
with federal regulations and standards such as SEC 17a-4f.

Copyright © 2012 EMC Corporation. Do not copy - All Rights Reserved. 35


This option is designed for long-term retention of backup data. It was formerly known as the
EMC Data Domain Archiver (or DD Archiver).
• VTL protocol is now supported for systems with DD Extended Retention software option
• Enhanced MTree replication support:
 Support for MTree replication to protect short-term retention data in active tier
between two systems enabled with DD Extended Retention software option
 MTree Replication support is applicable for data written via CIFS, NFS or VTL
protocols
 Supported on DD860 and DD990 systems
• Supports addition of DD Extended Retention software option on existing DD860 and
DD990 without data migration
• Improvements in ingest and replication performance to be similar to that of a system
without the DD Extended Retention software option
• Performance improvements in data migration from active to retention tier:
 New technique called ‘fast seeding’ improves data migration performance from
active to retention tier
 New phase called ‘packing’ to reclaim duplicate segments in the retention tier

Copyright © 2012 EMC Corporation. Do not copy - All Rights Reserved. 36


This lesson covers enhancements to licensed software options. Review the lesson objectives.

Upon completion of this lesson, you will be able to:


• Identify DD OS 5.2 enhancements to these software options:
 EMC Data Domain Encryption Software Option
 EMC Data Domain Boost Software Option
 EMC Data Domain Virtual Tape Library Software Option
 EMC Data Domain Replicator Software Option
• Describe the main features of each option

Copyright © 2012 EMC Corporation. Do not copy - All Rights Reserved. 37


EMC Data Domain Encryption Software Option Enhancements
• Enhancements have been made for integrating RSA Key Manager and Encryption for
data-at-rest

Copyright © 2012 EMC Corporation. Do not copy - All Rights Reserved. 38


Provides the ability to change and rotate keys used for encrypting data-at-rest by integrating
with RSA’s Data Protection Manager (DPM).

Rotating keys and tokens on a regular basis not only is required to meet compliance, but also
increases security by limiting data exposure and allowing Administrators to quickly respond to
events.

Functionality changes:
A centralized key management solution manages all the Data Domain systems and other
devices throughout the enterprise.

Key rotation, key life cycle management


• DPM manages the single key for encrypting data on the DD system.
• Key can be marked as: Active, Expired, Deleted, Compromised.

Note: These are RSA Key Management (RKM) key state names and are set through the RKM
interface. These names can differ from Data Domain system key state names.

Copyright © 2012 EMC Corporation. Do not copy - All Rights Reserved. 39


Here’s how rotating keys are handled.

Copyright © 2012 EMC Corporation. Do not copy - All Rights Reserved. 40


DD Encryption Software Option with RSA’s DPM
• Using this combination, significant benefits include:
 RSA-DPM provides a Federal Information Processing Standards (FIPS) 140-2
compliant solution
 Compliance requirements can be met by rotating keys on a periodic basis
 Administrators can respond to events, such as changing a key that is compromised
• These features require the purchase of a DD Encryption license and an RSA’s Data
Protection Manager appliance.
• Standard DD Encryption (no key change or rotation) is still available for customers who
do not have the DPM appliance, and the required licenses.

Note: Encryption of data-at-rest (standard DD Encryption or integration with DPM) is not


supported for systems with DD Extended Retention software option.

Copyright © 2012 EMC Corporation. Do not copy - All Rights Reserved. 41


EMC Data Domain Boost Software Option Overview
• Virtual Synthetics
 Provides the ability for a backup application to synthesize a full backup from a
previous full, plus subsequent incremental backups, on a Data Domain System
• Multiple interface groups (ifgroups)
 For load balancing and failover across multiple Ethernet interfaces
• Quotas for DD Boost storage units
• Integrated DD Boost Client Access
 Limits protocol usage to a specific set of Media Servers
• Additionally, increased integration support for:
 Oracle RMAN
 Greenplum
 IBM AIX 7.1 and RHEL 5 support for Symantec NetBackup™

Copyright © 2012 EMC Corporation. Do not copy - All Rights Reserved. 42


Here’s an example of how DD Boost and Virtual Synthetics work together. This provides the
ability for a backup application to synthesize a full backup from a previous full backup plus
subsequent incremental backups on a Data Domain system.

Considerations for using Virtual Synthetics include:


• Supported on NetBackup 6.5.4 and above
• Must be enabled on backup software
• Traditional full backups recommended for every 8 – 10 virtual full backups

Copyright © 2012 EMC Corporation. Do not copy - All Rights Reserved. 43


EMC Data Domain Virtual Tape Library Software Option Enhancements
• Systems with DD Extended Retention software option now support VTL protocol
• VTL MTree-based pools
 Creating a VTL pool implicitly creates a new MTree for the pool
 Creating VTL Pool ‘mypool’ is really creating MTree ‘/data/col1/mypool’
 Existing directory pools can be converted to MTrees
 If the pool is configured for directory replication, the conversion will also
convert the destination to MTree and the type to MTree replication
 Backward compatibility features available, such as:
 Pre-5.2 VTL directory pools are still supported: /backup/vtc/<pool>
• MTree replication extended to support VTL MTree pools
• VTL increased Stream Scaling
 540 Write and 150 Read streams, support for 540 drives in a single library
• VTL IBM i Enhancements
 Expanded support for IBM i 7.1 and IBM i virtualized environments

Copyright © 2012 EMC Corporation. Do not copy - All Rights Reserved. 44


EMC Data Domain Replicator Software Option Enhancements
• Enables granular protection of data on systems with DD Extended Retention software
license
• Data Domain systems with DD Extended Retention software can now use MTree
replication for short-term retention data in the active tier
 This capability is available for data written via CIFS, NFS and VTL with no migration
policy to the retention tier
 DD Boost managed file replication can still be used for long-term retention data –
or, as before, collection replication can be used for the whole system
• Extends MTree replication support for VTL MTree Pools
• Provides Disaster Recovery (DR) protection for systems with DD Retention Lock
Compliance software via collection replication
 If DD Retention Lock Compliance is enabled on a system, then as part of the
compliance requirements, it is necessary to have a secondary copy of the data.
 For the 5.2 release, the only supported form of replication for replicating data
locked with Retention Lock Compliance is collection replication.

Copyright © 2012 EMC Corporation. Do not copy - All Rights Reserved. 45


Replication for Systems with Extended Retention

With DD OS 5.2, a DD system with Extended Retention license can provide granular replication
for both NetWorker (via DD Boost) and CommVault (via CIFS) data.
• This allows a customer to send both NetWorker and CommVault data to the same Data
Domain system, providing short-term retention and MTree replication for the
CommVault dataset while also having long-term retention and a catalogue-aware DR
copy for the NetWorker dataset.

Copyright © 2012 EMC Corporation. Do not copy - All Rights Reserved. 46


MTree Replication and VTL

• DD OS 5.1 introduced MTree replication support for CIFS and NFS protocols.
• With DD OS 5.2, MTree replication has been extended to support replication of VTL
MTree pools. This enables a single replication type to be used for protecting data
written by all protocols except DD Boost.

Copyright © 2012 EMC Corporation. Do not copy - All Rights Reserved. 47


If DD Retention Lock Compliance is enabled on a system, then as part of the compliance
requirements, it is necessary to have a secondary copy of the locked data on the destination
Data Domain system.

For the DD OS 5.2 release, the only supported form of replication for data locked with DD
Retention Lock Compliance is collection replication.

Copyright © 2012 EMC Corporation. Do not copy - All Rights Reserved. 48


Here’s a summary of the key points covered in this module:
• Differences between the new DD Retention Lock Compliance and DD Retention Lock
Governance software editions
• The product, formerly known as DD Archiver, is now known as the new DD Extended
Retention software option
• Key enhancements made to DD Boost, DD Encryption, DD Virtual Tape Library, and DD
Replicator software options

Copyright © 2012 EMC Corporation. Do not copy - All Rights Reserved. 49


Can you?
• Choose which new software license provides a secure clock and other security
enhancements to prevent any data locked with the license from being altered,
mutilated, or destroyed
• Fill in the blank - Which new software option license was formerly known as DD
Archiver
• Choose two differences about DD Retention Lock licensing in DD OS 5.2
• Choose the combination that provides a centralized key management solution to
manage all the Data Domain systems and other devices throughout the enterprise
• Select three new features specifically for the DD Boost software option in DD OS 5.2
• Select what replication type can be used for enabling DR protection for systems with
DD Replication Lock Compliance software
• Choose if, on systems with the DD Extended Retention license, data movement can
be enabled for MTrees configured with MTree replication
• Choose if, on a DD system with the DD Extended Retention license, DR can be
configured if data migration is enabled for both NetWorker (via DD Boost) and
CommVault data (via CIFS)

Copyright © 2012 EMC Corporation. Do not copy - All Rights Reserved. 50


This module covers system management changes in DD OS 5.2 for the Command Line Interface
and Enterprise Manager GUI.

It is divided into two main areas of focus:


1. CLI commands
2. Enhancements to the GUI for new features and functionality

This module focuses on:


• Recognizing which CLI commands have been created, modified, or deleted for DD OS
version 5.2
• Identifying areas of the GUI that have been enhanced or added to support new features
and functionality in DD OS version 5.2

Copyright © 2012 EMC Corporation. Do not copy - All Rights Reserved. 51


This lesson covers CLI command changes in DD OS 5.2. Review the lesson objective.

Lesson 1: This lesson focuses on:


• Recognizing which CLI commands have been created, modified, or deleted for DD OS
version 5.2
 What’s New?
 What’s Modified?
 What’s Deleted or Deprecated?

Copyright © 2012 EMC Corporation. Do not copy - All Rights Reserved. 52


This is the launching point to view:
• What’s New?
• What’s Modified?
• What’s Deleted or Deprecated?

Use the tabs at the top of this window to review each type of command.

Refer to these guides for current and detailed information:


• The DD OS 5.2 Release Notes
• The DD OS 5.2 Command Reference Guide
• Initial Configuration Guide
• The DD OS 5.2 Administration Guide

Copyright © 2012 EMC Corporation. Do not copy - All Rights Reserved. 53


This lesson covers Enterprise Manager enhancements in DD OS 5.2. Review the lesson
objective.

Lesson 2: This lesson focuses on:


• Identifying areas of the GUI that have been enhanced or added to support new features
and functionality in DD OS version 5.2

Copyright © 2012 EMC Corporation. Do not copy - All Rights Reserved. 54


Overview of EMC Data Domain Enterprise Manager Enhancements
• New section in the Configuration Wizard for file system creation
• Configuring, managing, and monitoring quotas
• Expand capacity for retention (archive) units
• Converting VTL Pools to MTrees
• DD Boost multiple interface groups
• RSA Key Management and encryption for data-at-rest
• Chassis support for the DD990 system

Copyright © 2012 EMC Corporation. Do not copy - All Rights Reserved. 55


Take your time to click through this interaction in the online module to learn more about
each feature.

These features created enhancements in the DD OS 5.2 Enterprise Manager interface:


• DD Extended Retention enhancements
• DD Boost multiple interface groups
• GUI configuration wizard enhancements
• MTree quotas
• RSA key management
• VTL pools as MTrees
• DD990 Chassis Support

Copyright © 2012 EMC Corporation. Do not copy - All Rights Reserved. 56


Here’s a summary of the key points covered in this module:
• CLI commands that have been created, modified, or deleted for DD OS version 5.2
• Areas of the GUI that have been enhanced or added to support new features and
functionality in DD OS version 5.2

Copyright © 2012 EMC Corporation. Do not copy - All Rights Reserved. 57


Can you?
• Identify the new section that was added in the Configuration Wizard of the Enterprise
Manager interface
• Match several new features, that can be configured using Enterprise Manager, to the
functions they provide
• Identify how to configure MTree quotas in the Enterprise Manager interface

Copyright © 2012 EMC Corporation. Do not copy - All Rights Reserved. 58


This module provides a summary of additional features in DD OS 5.2. Review the objectives.

This module focuses on:


• Integration Improvements
 EMC Secure Remote Support (ESRS)
 Big Data Backup with Greenplum and Database Integration with Oracle RMAN
• System Monitoring and Diagnostic Improvements
 SNMP and MIB updates
 Overview of Offline Diagnostics Enhancements

Copyright © 2012 EMC Corporation. Do not copy - All Rights Reserved. 59


This lesson covers Integration Improvements in DD OS 5.2. Review the lesson objective.

Lesson 1: This lesson focuses on:


• Discussing integration improvements for ESRS, Greenplum, and Oracle RMAN

Copyright © 2012 EMC Corporation. Do not copy - All Rights Reserved. 60


ESRS Gateway incorporates Data Domain into the growing suite of ESRS-supported products.
• Requirements:
 ESRS Gateway version 2.14
 DD OS 4.8 and higher

Review the information in the table to fully understand the functionality of this release.

• ESRS connect-in (remote access) feature is functional for DD systems


 IP-based, secure AES-256 encryption and RSA digital certificates
• ESRS ConnectEMC
• System-initiated alerts sent to EMC Support
• ESRS actively monitors the health of a system through a heartbeat mechanism

Note: ESRS ConnectEMC is not functional for DD OS 5.2 systems with ESRS Gateway
version 2.14:
 DD systems aren’t integrated with ESRS’s ConnectEMC functionality yet
 DD systems won’t send system-initiated alerts to EMC Support
 EMC ESRS can’t actively monitor the health of Data Domain systems
• Solution: Data Domain products must be configured to generate and use their email-
home feature called autosupport (ASUP).

Copyright © 2012 EMC Corporation. Do not copy - All Rights Reserved. 61


Big Data Backup and Database Integration Improvements:

• DD Boost for Greenplum


 Faster, more efficient database backup

• DD Boost for Oracle RMAN


 Faster, more efficient Oracle backup
 Database Admin (DBA) has control of Data Domain replication processes

Copyright © 2012 EMC Corporation. Do not copy - All Rights Reserved. 62


Lesson 2: This lesson focuses on:
• Summarizing improvements made for system monitoring and diagnostics

Copyright © 2012 EMC Corporation. Do not copy - All Rights Reserved. 63


The Simple Network Management Protocol (SNMP) is a standard protocol for exchanging
network management information. SNMP provides a tool for network administrators to
manage and monitor network-attached devices, such as a Data Domain storage system.

Here’s an overview of several System Monitoring Improvements made in DD OS 5.2, which


include:
• SNMP Traps now include:
 Data Domain system serial number as an object
 An extra object to specify values which are not provided by pre-DD OS 5.2 SNMP
MIBs
• Alerts List enhancements include:
 New AlertHistory Table added
 Severity field added to the current alert table
• To enable SNMP, the configuration now requires either:
 SNMP V2C Community or SNMP V3 User name configuration
• Many new MIBs added

Let’s take a closer look at the new MIBs.

Copyright © 2012 EMC Corporation. Do not copy - All Rights Reserved. 64


Take a moment to review the new MIBs added in DD OS 5.2.
The EMC Data Domain Operating System 5.2 MIB Quick Reference Guide describes the full
set of MIB parameters included in the Data Domain MIB branch. Download this document from
the Support Portal.

To monitor Data Domain systems using SNMP, you will need to install the Data Domain MIB in
your SNMP Management system.
How To Download the SNMP MIB:
1. Using Enterprise Manager, navigate to the System Settings > General Configuration >
SNMP page, click Download MIB file.
2. In the Opening DATA_DOMAIN.mib dialog box, select Open.
3. Click Browse and select a browser to view the MIB in a browser window.
Note: If using the Microsoft Internet Explorer browser, enable Automatic prompting for file
download.
4. Save the MIB, typically to the location of the SNMP management tool, or exit the
browser.

DD OS also supports the standard MIB-II so you can also query MIB-II statistics for general data
such as network statistics. For full coverage of available data you should utilize both the Data
Domain MIB and the standard MIB-II MIB.

Copyright © 2012 EMC Corporation. Do not copy - All Rights Reserved. 65


Key enhancements made in these areas for the DD OS 5.2 release:
• Memory diagnostic
 Approximately 75% faster
 Link fail-over test added for DD990
• NVRAM diagnostic
• SAS diagnostic
 Approximately 30% faster
• VTL diagnostic
• Head Unit Disk Quick Test
 More comprehensive coverage
• PCIe motherboard topology test
 Includes checks for supported configurations
• User Interface Changes
 Several new hot keys and improved run screens
• USB key for install and diagnostics
Plus - enhancements made specifically for the DD990 platform.

Note: The Offline Diagnostics User's Guide is now generally available to customers.
Additionally, new Knowledge Base articles for technical support are available on the secure
support portal for reference.

Copyright © 2012 EMC Corporation. Do not copy - All Rights Reserved. 66


Review this table to learn which diagnostic tests are available across various systems.
*Examine System Inventory – this test gets information on the following system hardware:
• CPU
• BMC
• BIOS
• Motherboard
• Backplane
• Riser cards
• Memory configuration
• NVRAM card(s)
• SAS controllers (HBAs)
• Ethernet controllers (NICs)
• Fibre Channel (FC) controllers (Gateway and VTL systems)
Execution takes a few minutes, but the information is then cached for quicker
subsequent retrieval.
Note:
For DD990 systems, the serial number is in the Product Version field instead of the Product
Serial field where the value is found on other systems.

Copyright © 2012 EMC Corporation. Do not copy - All Rights Reserved. 67


Click around in this interaction in the online module to learn more about the changes to each
diagnostic and test.

This section provides an overview of the key enhancements for DD OS 5.2 release made to
the:
• Memory diagnostic
• NVRAM diagnostic
• SAS diagnostic
• VTL diagnostic
• Head Unit Disk quick test
• PCIe motherboard topology test

Copyright © 2012 EMC Corporation. Do not copy - All Rights Reserved. 68


Click around in this interaction in the online module to learn more about the user interface
changes made to Offline Diagnostics for DD OS 5.2:
• Select one versus deselect many
• Several new hot keys added
• Run screen changes
• Unsupported system identification

Copyright © 2012 EMC Corporation. Do not copy - All Rights Reserved. 69


Review this information on BIOS settings.

On older systems you may need to change system BIOS settings to:
• Boot the system from a USB key
• Use a serial console or laptop with your system

Click through this section to see how to set or edit the BIOS settings, which varies by system.

New BIOS settings for the DD990 are included in this section.

NOTE: The BIOS password and settings procedure is now in an internal Knowledge Base
article on the secure support portal. It has been removed from the DD OS 5.2 Offline
Diagnostics Users Guide.

Warning!
Do not change any other settings in BIOS that are not instructed. This could prevent the
system from booting properly.

Copyright © 2012 EMC Corporation. Do not copy - All Rights Reserved. 70


System Controller Boot Disk or USB Key with DD OS 5.2

• Refer to the EMC Data Domain Operating System USB Installation Guide for instructions
on how to download a bootable DD OS 5.2 USB image, install it onto a USB key, and
then select offline diagnostics from the boot menu.

• The DD OS 5.2 image contains the Offline Diagnostics Suite.

• To boot offline diagnostics, you must have one of the following:


 A functional system controller boot disk with DD OS 5.2 installed.
 A dedicated 1 GB (999 MB available) or larger USB key (a.k.a. keychain drive, thumb
drive, or flash memory stick) with a bootable image of DD OS 5.2 installed, inserted
in a controller system port.
 Note: Larger capacity USB keys will get resized to 1GB

Copyright © 2012 EMC Corporation. Do not copy - All Rights Reserved. 71


Inserting and Removing a USB Key for Writing Logs

• If you booted offline diagnostics from a USB key, you can use the same key to store log
files if it has at least 10 MB of free space.
 A 1GB key with DDOS will have about 100MB left of free space
• There are two ways to save diagnostic logs to a USB key.
 To save log files to a USB key automatically following a diagnostics run, insert the
USB key after the Main Menu appears, but before running diagnostics.
 To save the latest log files to a USB key manually, insert the USB key after
diagnostics have been run and select the Save Diagnostic Logs to USB Key option on
the Main Menu before starting another diagnostics run or exiting the Main Menu.

• Remove the USB key before exiting the Main Menu (and rebooting the system). The
USB key is un-mounted automatically.

Note: Running diagnostics a second time will overwrite previous logs. Download any logs you
want to preserve before running another diagnostic. This affects both USB, and infernally saved
logs.

Copyright © 2012 EMC Corporation. Do not copy - All Rights Reserved. 72


Viewing Logs on a USB Key

• Log files written to a USB key are stored in the parent log directory /diag_logs.
 It is created off the USB root and a subdirectory is created /<log-mm-dd-hh-mm>
(where mm = month,
dd = day, hh = hour, and mm = minute logs were saved).
 Individual diagnostic logs and a log of the diagnostic flow are saved in this
subdirectory: /diag_logs /<log-mm-dd-hh-mm>

• These logs are saved in ASCII format for viewing on any Linux or Windows machine.

Copyright © 2012 EMC Corporation. Do not copy - All Rights Reserved. 73


IPMI SEL is used to view and manage System Event Log (SEL) entries. SEL records store system
event information and may be useful to Technical Support for debugging problems.

IPMI SEL information capture is now available:


• Raw IPMI SEL log is now saved to SUB partition on disk and to USB key (if present) along
with diagnostic logs.
• Behavior similar to DDOS capture of IPMI SEL to sub bundle area.
• Allows direct interpretation or conversion back to ipmitool raw file.

Copyright © 2012 EMC Corporation. Do not copy - All Rights Reserved. 74


Here’s a summary of the key points covered in this module:
• Integration improvements for ESRS, Greenplum, and Oracle RMAN
• Improvements made for system monitoring and diagnostics

Copyright © 2012 EMC Corporation. Do not copy - All Rights Reserved. 75


Can you?
• Select which ESRS feature is supported in DD OS 5.2
• Choose two products in which DD OS 5.2 and EMC DD Boost create deployment
options for Big Data storage customers by supporting new integration enhancements
• Select which change takes effect in DD OS 5.2 regarding enabling SNMP
• Choose three choices that highlight changes made to Offline Diagnostics for DD OS
5.2

Copyright © 2012 EMC Corporation. Do not copy - All Rights Reserved. 76


To learn about EMC Data Domain products and solutions, consult the resources shown.
• For product information, including overviews, data and specification sheets, and white
papers, visit the link shown at EMC’s website.
• For product documentation, knowledge base articles, and additional white papers, visit
my.datadomain.com. This site requires a login.

Copyright © 2012 EMC Corporation. Do not copy - All Rights Reserved. 77


To find and enroll in follow-on training covering a wide range of topics including system
installation and maintenance, integration and implementation, administration and
troubleshooting, visit EMC Education Services, using the link shown.

Search for Data Domain to view a complete list of offerings.

Copyright © 2012 EMC Corporation. Do not copy - All Rights Reserved. 78


Congratulations!
You’ve completed this course and are now able to:
• Describe key improvements made to the Data Invulnerability Architecture and the
filesystem
• Compare and contrast new software options with enhancements made to existing
license software options
• Recognize changes made to the CLI and GUI to support DD OS 5.2 features and
functions
• Summarize additional new features for integrating and maintaining DD OS 5.2 systems

Copyright © 2012 EMC Corporation. Do not copy - All Rights Reserved. 79


Copyright © 2012 EMC Corporation. Do not copy - All Rights Reserved. 80

You might also like