How to Protect Virtual Machines: 10 Best Practices

 
 
By Chris Preimesberger  |  Posted 2014-01-29 Email Print this article Print
 
 
 
 
 
 
 
 

Virtualization of software, hardware and networking has created new levels of flexibility in the data center. Enterprise data centers continue to evolve from an environment based on physical servers and storage to one based on converged infrastructures and virtual platforms. As a result, we now have a clearly defined shift toward the software-defined data center. It's made everything it touches more agile, although it doesn't come without a measure of complexity. While virtualization improves efficiencies, it can also introduce new challenges driven by consolidated data stores, dynamic workloads and scalable infrastructures. That's where virtual machines (VMs) come to the fore—working wherever they are needed in the system. These changing dynamics are forcing organizations to rethink their data protection strategy so that it is optimized for a virtual server world. In this eWEEK slide show, which includes data from Gartner and Forrester researchers, data and information management software provider CommVault shares best practices for protecting those critical VMs that run so many workloads.

 
 
 
  • How to Protect Virtual Machines: 10 Best Practices

    by Chris Preimesberger
    1 - How to Protect Virtual Machines: 10 Best Practices
  • Reduce VM Sprawl

    According to analysis from Gartner, Forrester and others, 30 to 40 percent of VMs can end up being unused after a period of time, and 10 percent of those orphaned VMs can have a major impact on costs. Implementing a strategy to archive unused VMs ensures businesses maintain control of virtual resources and frees up computing and storage resources. A good archiving solution will ensure that archived VMs are still visible in tools such as VMware vCenter and can be recovered on demand.
    2 - Reduce VM Sprawl
  • Automate VM Protection

    Using policy-based automatic protection of virtual machines reduces administrative overhead when protecting large environments. As organizations work to introduce private cloud features such as self-service provisioning portals, it will be critical to remove the burden from IT administrators by automating the discovery and protection of newly created machines.
    3 - Automate VM Protection
  • Deploy a Scalable Solution

    Today there is a growing use of the public cloud as enterprises become more comfortable with the reliability and security of public clouds from big providers, such as Amazon Web Services and Rackspace. The ability to protect VMs while growing seamlessly from initial deployment to cloud-based infrastructure is important. Enterprises should consider deploying tools that assist with workload portability to enable them to quickly and easily migrate workloads to different types of infrastructure to achieve cost savings and meet SLAs.
    4 - Deploy a Scalable Solution
  • Accelerate Recovery

    A virtual machine data protection strategy is only as good as the recovery time for virtual machine data. Virtual server protection strategies need to ensure that you can rapidly recover any type of data residing across the environment to meet service levels. This usually means that a one-size-fits-all data protection methodology won't work. Organizations should plan to use agentless VM backup, such as streaming vSphere vStorage API for Data Protection (VADP), for most workloads, complemented by hardware snapshots for high I/O or high change-rate applications, and even agents in guests for workloads that require greater application consistency.
    5 - Accelerate Recovery
  • Simplify Disaster Recovery

    The encapsulation and portability inherent in virtualized infrastructures can be a powerful way to simplify disaster recovery operations and accelerate recovery. Extending virtualization to mission-critical workloads or adding tools that can perform on-the-fly P2V migrations for recovery into virtual infrastructure will enable a much more agile disaster recovery scenario for these applications without breaking the bank.
    6 - Simplify Disaster Recovery
  • Plan Out Application Strategy

    This may seem like an obvious one, but planning out your virtualization and cloud application strategy ahead of time is important in effectively managing mission-critical applications. With applications being moved to different virtual machines and potentially the cloud, defining how you will support mission-critical apps along with other business apps can help determine the policies you put in place.
    7 - Plan Out Application Strategy
  • Use Policies to Track Changing Dynamics

    As data moves from machine to machine, you need to maintain consistent access and control. Using policy-based management can guarantee that changes are tracked and accounted for to ensure data integrity and minimize business disruption.
    8 - Use Policies to Track Changing Dynamics
  • Develop a Smart Virtualization and Cloud Strategy

    Virtualization reduces complexity for end users and allows IT resources to be used more efficiently, but it's only part of the puzzle. Pairing cloud adoption and migration with virtualization allows enterprises to move critical applications such as SharePoint, Oracle or SAP to a public cloud and alleviate the pressures put on internal resources.
    9 - Develop a Smart Virtualization and Cloud Strategy
  • You Don't Need to Virtualize Everything

    Virtualization isn't always the solution. Whether it be for compliance or performance purposes, not every application is a fit to be virtualized. Determining which applications would benefit from virtualization needs to be determined up front.
    10 - You Don't Need to Virtualize Everything
  • Test OpenStack and KVM (Kernel-based Virtual Machine)

    More and more large enterprises are trying out methods to shed the licensing costs of virtualization software in favor of next-generation private cloud technologies, like KVM and OpenStack. These technologies probably aren't ready for most production environments today, but it makes sense to start familiarizing yourself with them so you can discern when the time is right to start considering them more seriously.
    11 - Test OpenStack and KVM (Kernel-based Virtual Machine)
 
 
 
 
 
 
 
 
 
 
 

Submit a Comment

Loading Comments...

 
Manage your Newsletters: Login   Register My Newsletters























 
 
 
 
 
 
 
 
 
Rocket Fuel