Backup Strategies for Integrity Virtual Machines
Table Of Contents

Backup Strategies for Integrity Virtual Machines
 Introduction                ........................................................................................................................   2 
Basic Aspects of Data Protection for Virtual Environments              ..........................................................   2 
Backup and Recovery from the VM Host System                    ...................................................................   3 
Backup and Recovery of Individual Virtual Machines           .............................................................   3 
Protecting the Virtual Environment Configuration             ...................................................................   4 
Data Protection Scenarios for Virtual Machines              ........................................................................   5 
Network Backup and Recovery                       ..........................................................................................   5 
Statically Attached Device Backup and Recovery                ..................................................................   6 
Dynamically Attached Device Backup and Recovery                     .............................................................   7 
Volume Splitting on the VM Host                       ........................................................................................   9 
Consolidated Virtual System Backup from VM Host                .............................................................   10   
Disaster Recovery, Ignite-UX, and Integrity Virtual Machines               ....................................................   10   
General Guidelines and Suggestions             ....................................................................................   11   
Storage Configuration for Reliability                      .................................................................................   11   
Plan for Recovery of the Virtual Environment            .......................................................................   11   
Best Practices for Using EBS on Integrity Virtual Machines             ....................................................   11   
Configuration Tips for Backup and Recovery Software                   .....................................................   11   
Summary                          ...................................................................................................................   12   
Conclusion                .......................................................................................................................   12   
For more information                .........................................................................................................   12   
General information online               ...........................................................................................   12   
Documentation and white papers                   ..................................................................................   12   










