Menu Close

How many Veeam Backup proxies do I need?

How many Veeam Backup proxies do I need?

36 cores and 72 GB RAM for Full Backups For virtual proxy servers, it is recommended to configure multiple proxies with maximum 8 vCPUs to avoid co-stop scheduling issues. 5 virtual proxy servers are required in this example.

How many repositories can you add to Veeam at the same time?

If you use Enterprise edition of Veeam Backup & Replication, you can create two scale-out backup repositories.

How does Veeam Backup proxy work?

Veeam Backup & Replication will analyze the backup proxy configuration, define to which datastores it has access and automatically select the best way to retrieve and restore data depending on the type of connection between the backup proxy and the source datastore.

Can a Veeam proxy backup itself?

Re: Backup proxy backing up itself The same, any Veeam component can be backed up if it is installed in the VM.

What are the basic backup proxy tasks?

Basic backup proxy tasks include the following:

  • Retrieving VM data from the production storage.
  • Compressing.
  • Deduplicating.
  • Encrypting.
  • Sending it to the backup repository (for example, if you run a backup job) or another backup proxy (for example, if you run a replication job)

What is proxy affinity?

Proxy affinity determines what backup proxies are eligible to access a specific backup repository and read/write data from/to this backup repository. Proxy affinity lets you control assignment of resources in the backup infrastructure and reduce administration overhead.

What is capacity tier?

Capacity tier is an additional tier of storage that can be attached to a scale-out backup repository. Data from the scale-out backup repository performance extents can be transported to the capacity tier for long-term storage. This feature is most useful if: You are running out of storage space.

How does Veeam scale-out repository work?

A: Veeam’s Scale-out Backup Repository is a software object. It is a logical entity that groups multiple “simple” repositories (see above) into one abstract repository. Thus, Veeam Backup & Replication creates a pool of storage devices, summarizing their capacity and increasing their performance when set properly.

What is proxy affinity on Veeam?

Proxy affinity settings are specified at the level of a backup repository. By default, Veeam Backup & Replication lets all backup proxies in the backup infrastructure access the backup repository. Using proxy affinity settings, you can define a list of backup proxies that can access this backup repository.

How does Veeam capacity tier work?

How do I make a scale-out my backup repository?

Adding Scale-Out Backup Repositories

  1. Launch the New Scale-Out Backup Repository wizard.
  2. Specify the scale-out backup repository name.
  3. Add performance extents.
  4. Specify backup placement policy.
  5. Add capacity tier.
  6. Add archive tier.
  7. Finish working with the wizard.

What is application aware processing?

Application-aware processing is Veeam’s proprietary technology based on Microsoft VSS. Microsoft VSS is responsible for quiescing applications and creating a consistent view of application data on the OS of the Veeam Agent computer.

What is Veeam scale-out Repository?

The Veeam Scale-out Backup Repository provides horizontal-scaling support for storing data in multiple tiers. This repository contains one or more backup repositories called performance extents, and it can be expanded with cloud-based repositories or local object repositories.

How do you make a veeam scale-out Repository?

To add a scale-out backup repository to the Veeam Backup & Replication infrastructure, do the following:

  1. In the inventory pane, right-click Scale-out Repositories and select Add Scale-out Backup Repository.
  2. At the Name step of the wizard, specify a name and an optional description for the scale-out backup repository.

What is a Tier 1 workload?

Tier 1 commonly refers to high-performance hard disks that store an organization’s more critical or frequently accessed data, such as transactional data.