Professional Documents
Culture Documents
DD CONCEPTS AND
FEATURES
PARTICIPANT GUIDE
PARTICIPANT GUIDE
Table of Contents
Introduction to PowerProtect DD 4
PowerProtect DD System Overview 4
Backup Environment Without PowerProtect DD 5
PowerProtect DD System Benefits 7
Backup Environment with PowerProtect DD 10
Current Models 12
Expansion Shelves 14
Hardware Features 16
PowerProtect DD Virtual Edition Features 20
DD Operating System Features 22
Features and Capacity Licensing 25
Smart Scale 72
Overview 72
Introduction to PowerProtect DD
• Increasing the storage speed and capacity for the data that is
generated along with the cost-effectiveness
• The expensive and resource-intensive tasks of gathering, storing, and
protecting data backups
• The large financial and labor resources required to write data to tapes
and ship them offsite for storage
3. Tapes are physically transported and stored offsite for archival and
disaster recovery purposes. If there is a negative event in the data
center, moving tapes offsite prevents the loss of backup data.
4. Data recovery requires a manual process of transporting the tapes
back to the primary storage device in the data center.
Seamless Integration
Multicloud Protection
Operational Simplicity
Smart Scale
2The reduced data footprint allows data to be retained on-site for longer
periods and allows transfer across the network for archival.
Current Models
Review the table below to learn more about each PowerProtect DD model.
Max Up to 4 Up to 4.2 Up to Up to 15 Up to 26 Up to 41
Throughput TB/hr TB/hr 12.7 TB/hr TB/hr TB/hr
TB/hr
Max Up to Up to 7.0 Up to Up to 33 Up to 57 Up to 94
Throughput 11.2 TB/hr 27.7 TB/hr TB/hr TB/hr
(DD Boost) TB/hr TB/hr
Logical Up to Up to 4.8 Up to Up to Up to Up to
Capacity 14.8 PB PB 33.5 PB 56.1 PB 149.8 PB 293 PB
with Cloud
Tier
Expansion Shelves
Review the table below to learn more about the capacities and
compatibilities of the options for the expansion shelves.
Hardware Features
Connectivity
The figure and table below describe the PowerProtect DD system back
panel:
3 Rear handle
9 VGA port
10 Serial port
Redundancy
DDVE Features
DDVE Platforms
Feature Description
Dell Cloud Dell Cloud Tier enables a system to move data from the
Tier active tier to low-cost, high-capacity object storage in the
public, private, or hybrid cloud for long-term retention.
Feature licenses allow you to purchase only those features you intend to
use.
The following are some examples of the features that require additional
licensing:
• DD Boost
• DD VTL
• DD Encryption
• DD Replicator
• DD Retention Lock Compliance Edition
• DD Retention Lock Governance Edition
• Dell Cloud Tier
Administrative Access
• SSH and Telnet to run CLI commands for management and setup.
− Telnet is disabled by default.
• HTTPS and HTTP to access the DD System Manager (DDSM) to
perform management and setup tasks.
− HTTP access is disabled by default.
• Representational State Transfer (REST) to administer a PowerProtect
DD system.
You can backup clients using the protocols that the backup software
supports. PowerProtect DD systems support standard TCP/IP protocols
such as CIFS and NFS, or the Dell proprietary DD Boost protocol.
Client Direct
Backup and archive media servers send data from clients to the
PowerProtect DD appliance on the network. A direct connection between
a dedicated port on the backup management server and a dedicated port
on the PowerProtect DD appliance may also be used.
Backup and archive media servers use the following protocols to send
data to a PowerProtect DD appliance over Ethernet:
• CIFS
• NFS
• DD Boost
• Network Data Management Protocol (NDMP)
Fibre Channel
With the DD VTL license, the backup or archive server sees the
PowerProtect DD appliance as one or multiple DD VTLs.
Replication
The PowerProtect DD appliance writes backup data to its file system. You
can physically separate backup and replication traffic by configuring two
separate Ethernet interfaces on the PowerProtect DD appliance. This
separation allows backups and replication to run simultaneously without
network conflicts.
The DD Operating System (DDOS) has a file system for system and
administrative files and another for storing backup data.
• Administrative files
• Core files
• Log files
• Support bundles
• Upgrade packages
You cannot rename or delete the /ddvar file system, and it does not
provide access to all subdirectories. Only Dell Support can access the
/ddvar file system.
MTree
The Managed Tree (MTree) file structure provides a root directory in the
/data/col1 folder and:
Overview
3. Fault detection and healing use RAID 6 redundancy to heal faults and
periodically rechecks the integrity of the RAID stripes.
a. PowerProtect DD6400 uses Storage Pool RAID technology for fault
detection and healing.
b. DDVE uses RAID on LUN (ROL) for fault detection and healing.
4. File system recovery reconstructs lost or corrupted file system
metadata6 and includes check tools that can bring the system back
online safely and quickly.
6The file system re-creates by scanning the logs and rebuilding from
metadata.
DD Boost
DD Replicator
Replication Topologies
Replication Types
7Collection replication does not have the flexibility of the other types, but it
can provide higher throughput and support more objects with less
overhead, which may work better for high-scale enterprise cases.
DD Retention Lock
BoostFS
Cloud Tier
The system treats Cloud Tier as an additional storage tier and moves data
between tiers as necessary. The system maintains file system metadata
associated with cloud-stored data in local storage and also mirrors it to the
cloud. The metadata that resides in local storage facilitates operations
such as deduplication, cleaning, fast copy, and replication.
Supported Features
• DD Retention Lock
− Meets all the regulatory and compliance policies
• DD Encryption
− You can enable DD Encryption at three levels: System, Active Tier,
and cloud unit.
− DD Encryption of the Active Tier is only applicable if encryption is
enabled for the system.
− Cloud units have separate controls for enabling DD Encryption.
• DD Replicator
− Managed file replication and MTree replication are supported on
Cloud Tier enabled systems.
• DD VTL
DD Secure Multi-Tenancy
Overview
Architecture
In this example, two companies Red and Blue share the same
PowerProtect DD system. Tenant units and individual data paths are
logically and securely isolated from each other and managed
independently. Tenant users can backup using their application servers to
a PowerProtect DD system storage in secure isolation from other tenants
on the PowerProtect DD system.
The administrator is responsible for the system monitors and manages all
tenants in the system, and has visibility across the entire system. The
administrator set capacity and stream quotas on the system for the
different tenant units, and report on tenant unit data.
Terminology
Term Description
Benefits
DD High Availability
DD HA uses:
Overview
Virtual tape drives are accessible to the backup software in the same way
as physical tape drives.
DD VTL supports the simultaneous use of the tape library and file
system10 interfaces.
Supported Features
• DD Replicator
− Pools and tapes can replicate to a remote PowerProtect DD system
for disaster recovery (DR).
• DD Retention Lock Governance software
− Protect data on tapes from modification.
• Cloud Tier
− Store the DD VTL vault in the cloud for long-term retention (LTR).
• DD High Availability (DD HA)
Terminology
Data Security
DD Encryption
Data Sanitization
• Level 1 cleaning that meets many situations, requires that the data to
be removed be written over at least one time.
• Level 2 cleaning requires that the entire storage must be sanitized
using Dell Professional Services Secure Data erasure practice.
Cyber Recovery
With the Cyber Recovery software, you can create, run, and monitor
policies that protect your data.
You can configure the DD Operating System (DDOS) for user access to
the PowerProtect DD system for administrative tasks using FTP, FTPS,
HTTP, HTTPS, SSH, SCP, and Telnet protocols. SSH and HTTPS are
active by default.
The following roles are available for administering and managing DDOS:
Role Description
admin Users with this role can configure and monitor the entire
system. Some features and commands require the approval of
a security role user.
limited- Users with this role can configure and monitor the system with
admin some limitations. A user with this role cannot perform data
deletion operations, edit the registry, or enter bash or SE mode.
user Users with this role can monitor systems, change their own
password, and cannot change the system configuration.
security Users with this role can manage other security officers and
officer authorize procedures that require security officer approval. The
security role is provided to comply with the Write Once Read
Many (WORM) regulation. As a result of compliance
regulations, most command options for administering sensitive
operations, such as DD Encryption, DD Retention Lock
Compliance, and archiving now require security officer
approval.
backup- Users with this role can perform all tasks that are permitted for
operator user role users, create snapshots for MTrees, import, export,
and move tapes between elements in a virtual tape library, and
copy tapes across pools. They can also add and delete SSH
public keys for nonpassword required log-ins; add, delete, reset,
and view CLI command aliases, synchronize modified files, and
wait for replication to complete on the destination systems.
tenant- Users with this role can configure and monitor a specific tenant
admin unit.
tenant- Users with this role can monitor a specific tenant unit, change
user the user password, and view the tenant unit status. A tenant-
user cannot change the tenant unit configuration.
DD Storage Migration
Overview
With new enclosures, you can migrate the data from the older enclosures
to the new enclosures while the system continues to support other
processes such as data access, expansion, cleaning, and replication.
The storage migration does require system resources, but you can control
this with throttle settings that give the migration a relatively higher or lower
priority. You can also suspend a migration to make more resources
available to other processes, then resume the migration when resource
demand is lower.
The migration copy process occurs at the shelf level, and not at the logical
data level. As a result, all disk sectors on the source shelf are accessed
and copied over regardless of whether there is data on them.
The minimally disruptive upgrade (MDU) feature lets you upgrade specific
software components or apply bug fixes without perform a system reboot.
Direct Access
When you complete the initial configuration connect to the system using
the default administrator username and password:
Remote Access
After the initial configuration is done, you can use SSH or Telnet if it is
enabled, the Intelligent Platform Management Interface (IPMI), or SOL
utilities to access the PowerProtect DD system remotely using CLI
commands.
• Running diagnostics
• Installing, upgrading, or reconfiguring DDOS
• Accessing the BIOS
• Viewing Power On Self-Test (POST) and boot messages
DD System Manager
Overview
DDSM provides:
DDSM Interface
1. The banner displays buttons for Refresh, Information, Help, and User
Settings.
2. The navigation panel in on the left side and displays the highest level
menu selections that you can use to identify the system component or
task that you want to manage.
3. The work area displays information and controls related to the selected
item in the Navigation panel and is where you find system status
information and configure a system.
Overview
DDMC:
DDMC Interface
1. The banner display buttons for Alerts, Settings, Refresh, Help, and User
Settings.
2. The Navigation panel on the left side displays the highest level menu
selections that you can use to identify the system component or task
that you want to manage.
3. The work area displays information and controls related to the selected
item in the navigation panel and is where you find system status
information and configure systems.
Deep Dive: For more information about DDMC, see the Dell
PowerProtect DD Management Center Installation and
Administration Guide at the Dell Support Website.
Notes
Smart Scale
Overview
Smart Scale:
Deep Dive: For more details about Smart Scale, see the
Dell PowerProtect DD Management Center Installation and
Administration Guide on the Dell Support website.
RAID 6
A Redundant Array of Independent Disks or RAID is a read-and-writing
technology that can reduce the chance of data loss for multiple drives.
RAID 6 is the sixth iteration of storage protocols that are designed for a
multidisk arrangement. It is a data-striping process that uses two disks as
a backup.
The SEC defines rigorous and explicit requirements for regulated entities
that elect to retain books and records on electronic storage media.
System Pool
A System Pool is a defined set of PowerProtect DD systems for
organization management. Examples of this are workload types, like
backups for Oracle, VM, and others. The DDMC manages these
PowerProtect DD systems and balances client workloads that access the
hosted mobile storage units. A system pool resides in a data center.