HP D2D D2D Best Practices for VTL, NAS and Replication implementations (EH985- - Page 130

HP D2D Manual

Page 130 highlights

O open files, 31 out of sync notifications, 68 P performance activity graph, 44 deduplication, 7 libraries per appliance, 27 maximum concurrent backup jobs, 26 maximum NAS operations, 36 metrics on GUI, 44 multi-streaming, 9 NAS, 31, 34 network, 22 replication, 7 reporting metrics on GUI, 46 performance tools, 44 Permissions domain, 43 physical tape seeding, 64 product numbers, 4 R recommended network mode, 14 reference information G1 products, 84 G2 products, 83 replication bandwidth limiting, 66 best practices, 49 blackout windows, 66 concurrency, 54 fan in/out, 53 guidelines, 53 impact on other operations, 66 monitoring, 68 overview, 7, 49 performance considerations, 7 seeding, 56 source appliance permissions, 67 usage models, 50 WAN link sizing, 55 replication activity monitor, 68 replication concurrency limiting, 55 replication throughput, 69 reporting metrics, 46 retention policy, 28 rotation scheme, 28 example, 29 S seeding active/active, 58 active/passive, 58 co-location (over LAN), 60 co-location at source, 60 floating D2D, 62 many to one, 59 methods, 57 over a WAN link, 58 overview, 56 using physical tape, 64 single port mode, 12 sizing guide, 23 sizing tool example, 87 source, 67 storage and deduplication ratio, 46 store migration, 118 StoreOnce technology, 7 switched fabric, 19 synthetic backups, 37 Sys-Perf, 44 T tape offload best practices, 79 overview, 76 performance factors, 79 transfer size, 27, 34 U user authentication, 38 V verify operation, 28, 37 VTL benefits of, 30 best practices, 25 W WAN link sizing, 55 worked example, 85 Z zoning, 20 130

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131

130
O
open files, 31
out of sync notifications, 68
P
performance
activity graph, 44
deduplication, 7
libraries per appliance, 27
maximum concurrent backup jobs, 26
maximum NAS operations, 36
metrics on GUI, 44
multi-streaming, 9
NAS, 31, 34
network, 22
replication, 7
reporting metrics on GUI, 46
performance tools, 44
Permissions
domain, 43
physical tape
seeding, 64
product numbers, 4
R
recommended network mode, 14
reference information
G1 products, 84
G2 products, 83
replication
bandwidth limiting, 66
best practices, 49
blackout windows, 66
concurrency, 54
fan in/out, 53
guidelines, 53
impact on other operations, 66
monitoring, 68
overview, 7, 49
performance considerations, 7
seeding, 56
source appliance permissions, 67
usage models, 50
WAN link sizing, 55
replication activity monitor, 68
replication concurrency
limiting, 55
replication throughput, 69
reporting metrics, 46
retention policy, 28
rotation scheme, 28
example, 29
S
seeding
active/active, 58
active/passive, 58
co-location (over LAN), 60
co-location at source, 60
floating D2D, 62
many to one, 59
methods, 57
over a WAN link, 58
overview, 56
using physical tape, 64
single port mode, 12
sizing guide, 23
sizing tool
example, 87
source, 67
storage and deduplication ratio, 46
store migration, 118
StoreOnce technology, 7
switched fabric, 19
synthetic backups, 37
Sys-Perf, 44
T
tape offload
best practices, 79
overview, 76
performance factors, 79
transfer size, 27, 34
U
user authentication, 38
V
verify operation, 28, 37
VTL
benefits of, 30
best practices, 25
W
WAN link sizing, 55
worked example, 85
Z
zoning, 20