Book Image

Mastering Veeam Backup & Replication - Second Edition

By : Chris Childerhose
Book Image

Mastering Veeam Backup & Replication - Second Edition

By: Chris Childerhose

Overview of this book

Veeam is one of the leading modern data protection solutions, making it a necessary skill for anyone responsible for securing virtual environments. This revised second edition of Mastering Veeam Backup & Replication is updated to cover Veeam version 11. The book guides you through implementing modern data protection solutions for your cloud and virtual infrastructure with Veeam, all while helping you master advanced concepts such as Continuous Data Protection (CDP), extended object storage support, Veeam ONE enhancements, and Orchestrator. Starting with Veeam essentials, including installation, best practices, and optimizations for Veeam Backup & Replication, you'll get to grips with the 3-2-1-1-0 rule to safeguard data. You'll understand how to set up a backup server, proxies, repositories, and more and then advance to cover a powerful feature of Veeam 11 – CDP. As you progress, you'll learn about immutability (also known as hardened repositories) and discover the best practices for creating them. Finally, you'll explore the new proxy option available in Linux and become well-versed with advanced topics such as extended object storage support, Veeam ONE enhancements, and Orchestrator. By the end of this Veeam book, you'll be able to implement Veeam Backup & Replication for securing your environment and enabling disaster recovery.
Table of Contents (15 chapters)
1
Section 1: Installation – Best Practices and Optimizations
4
Section 2: CDP and Immutability – Hardened Repositories, Backups, and Object Storage
9
Section 3: Linux Proxy Enhancements, Instant Recovery, Veeam ONE, and Orchestrator

Configuring CDP proxies and settings

The CDP proxy is the component that performs the data movement and transfers data between the source and target hosts. It serves the following tasks:

  • It receives VM data from the production storage.
  • It aggregates the changed data.
  • It prepares data for short-term restore points.
  • It compresses and deduplicates data.
  • It encrypts and decrypts data.
  • It sends data to the storage in the disaster recovery site or another VMware CDP proxy.

The following depicts a typical CDP proxy deployment on both a source and target cluster:

Figure 3.11 – A typical CDP proxy configuration

Veeam also recommends that you design your CDP environment so that the CDP proxy is only used as a source or target proxy, not both. A great example would be having cross-cluster or cross-host replication (from ESXi 1 to ESXi 2 and from ESXi 2 to ESXi 1). In this scenario, you would have four CDP proxy servers as follows...