Veeam tape backup best practice1/25/2024 ![]() ![]() A proxy task processes one file share at a time and CPU/RAM resources are used for inline compression and/or encryption. Proxies do have multiple task slots to process source data depending on the number of CPU cores available. In this section, we will outline the recommendations to follow for appropriate sizing. Getting the right amount of processing power is essential to achieving the RTO/RPO defined by the business. We recommend to use the latest supported OS version with latest updates to have all security and performance related updates included. Note: In v12, the backup proxy for File Backup has been renamed to General-purpose backup proxy Proxy OS requirements ![]() Optimized data, after being processed by the Proxy, will be transferred here. The traffic from the source to the proxy is not yet optimized, meaning that 100% of the backup data will be transferred over this link.Īlso, consider a good connection between proxy and repository. This site uses Just the Docs, a documentation theme for Jekyll.Īs a general rule, the proxy should be as close to the source data as possible with a high bandwidth connection. ![]()
0 Comments
Leave a Reply.AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |