立即与支持人员聊天
与支持团队交流

DR Series DR4300 - DR Series System Administrator's Guide

Introducing the DR Series system documentation Introducing the DR Series system Setting up the DR Series system Configuring the DR Series system settings Managing containers Managing replications Monitoring the DR Series system Using GlobalView Configuring and using Rapid NFS and Rapid CIFS Configuring and using Rapid Data Access with NetVault Backup and with vRanger Configuring and using RDA with OST
Understanding RDA with OST Guidelines Terminology Supported RDA with OST software and components Best Practices: RDA with OST and the DR Series System Setting client-side optimization Configuring an LSU Installing the RDA with OST plug-in Configuring DR Series system information using NetBackup Backing Up Data From a DR Series System (NetBackup) Using Backup Exec with a DR Series system (Windows) Understanding the OST CLI commands Understanding RDA with OST Plug-In Diagnostic Logs Collecting Diagnostics Using a Linux Utility Guidelines for Gathering Media Server Information
Configuring and using VTL Configuring and Using Encryption at Rest Support, maintenance, and troubleshooting Supported Ports in a DR Series System

Replication seeding

Replication seeding

The DR Series system supports replication seeding, which provides the ability to create a local seed and place it in a remote system. The seed backup is a process on the source DR Series system, which collects all of the unique data chunks from the containers and stores them on the target device. This is helpful if you have a new replication target DR to set up, the amount of data to be replicated is very large, and the network bandwidth is low. You can seed the target replica with the source data saved on a third party device, for example, a CIFS—mounted share, attach it to the target DR and then get the data into the target DR. Once the seeding is complete, replication is enabled between source and target and replication re-synchronization is done to complete any pending data transfers. Thereby, continuous replication can be done, which reduces network traffic significantly, and data can be replicated and synced with the target in a short amount of time.

You can initiate seeding using the DR Series system command line interface (CLI), and the data to be seeded is gathered in an organized manner and stored in the target devices. Refer to the Dell DR Series System Command Line Reference Guide for more information about replication seeding support.

Reverse replication

Reverse replication

The concept of reverse replication is not a supported operation on the DR Series system. This is because replica containers are always in a R-O (read-only) mode on the DR Series system, thus making write operations a non-supported operation.

Under very specific conditions, it could be possible for replica containers to support a type of write operation whose sole function is to restore data from an archival target. For example, data could be replicated back to the remote site where a data management application (DMA), or backup software, is connected to allow this data to be restored directly.

This specific type of case applies only to configurations where data is backed up from a remote location to a local container, and then replicated over a WAN to a replica container that is backed up to tape. The data needs to be restored from the tape backup to the original location; first back to a DR Series system replica container, and then back to the original source location of the data on the other side of the WAN link.

To leverage this type of deduplication across the WAN, complete the following:

Under this scenario, a fraction of the data to be recovered is sent across the WAN link. This could speed up a remote restore significantly. However, there are some downsides to this type of scenario:

Reverse replication: alternate method

Reverse replication: alternate method

For an alternate method of reverse replication, complete the following steps:

Secure erase

Secure erase

Secure Erase is a process for securely deleting data that follows standards developed by the Defense Security Service (DSS). These standards were developed to solve the problem of secure and permanent removal of data, and this capability is now used by many commercial enterprises. These standards require multiple passes to erase data. In the process of erasing, the system overwrites data with zeros, a random pattern of data, or ones (1s) to make the original contents unreadable.

In the DR Series system, two modes of secure erase have been adopted: 3-pass and 7-pass standards.

The Secure Erase process can be completed at the system level by using the DR Series system CLI. This feature securely erases all data with a 3-pass or 7-pass mode and runs during the system initialization. This method erases all of the stored data while keeping the system in tact. See the DR Series System Command Line Reference Guide for more information.

相关文档

The document was helpful.

选择评级

I easily found the information I needed.

选择评级