Data Domain: Replication Version Compatibility Matrix
Summary: This article provides information about the Replication Version Compatibility Matrix. It provides information about supported replication (MTree, directory, collection, and delta) for different configurations per Data Domain operating system versions. ...
Instructions
Replication Versions Compatibility matrix
- Dell EMC Data Domain Boost devices with VS workload can use ONLY Managed File Replication or Collection Replication.
- Directory and Collection replication is not supported on the DDVE platforms.
- VTL replication is not supported as DDVE does not support VTL.
- For MTree replication or managed file replication, if a DDOS 7.2 or later source is configured to replicate to a target running DDOS 6.2 with gz or gzfast compression, the target system must be upgraded to DDOS 6.2.0.35 or later.
Replication compatibility (as either a source or destination system) with other versions of DDOS depends on the type of replication:
- Compatible with this DDOS release family, and the previous and next DDOS major release families
- Collection replication: Compatible only within same DDOS version
- Delta (low-bandwidth optimization) replication: Compatible with the two previous DDOS release families and the next two DDOS release families
● MTree replication and MFR are compatible with previous and next release family only. For example, a Data Domain
Operating System 7.X system is compatible with systems running a Data Domain Operating System 8.X system or a Data
Domain Operating System 6.X system.
● Collection replication is compatible with all minor releases. For example, a Data Domain Operating System 7.7.1.X system is compatible with systems running Data Domain Operating System
7.7.0.X and or Data Domain Operating System 7.7.2.X, but not with systems running Data Domain Operating System 7.6.X or Data Domain Operating System 7.8.X
Sample Table lists legacy supported Replication:
| Source DDOS |
Destination DDOS Versions | ||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 6.1 | 6.2 | 7.0 | 7.1 | 7.2 | 7.3 | 7.4 | 7.5 | 7.6 | 7.7 | 7.8 | 7.9 | 7.10 | 7.11 | 7.12 | 7.13 | 8.0 | 8.1 | 8.2 | 8.3 | 8.4 | 8.5 | 8.6 | |
| 6.1 | m, dir, c, del | m, dir, del | m, dir, del | m | m | m | |||||||||||||||||
| 6.2 | m, dir, del | m, dir, c, del | m, dir, del | m, dir, del | m | m | m | m | m | m | m | m | m | m | m | m | |||||||
| 7.0 | m, dir, del | m, dir, del | m, dir, c, del | m, dir, del | m, dir, del | m | m | m | m | m | m | m | m | m | m | m | m | m | m | m | m | m | m |
| 7.1 | m | m, dir, del | m, dir, del | m, dir, c, del | m, dir, del | m, dir, del | m | m | m | m | m | m | m | m | m | m | m | m | m | m | m | m | m |
| 7.2 | m | m | m, dir, del | m, dir, del | m, dir, c, del | m, dir, del | m, dir, del | m | m | m | m | m | m | m | m | m | m | m | m | m | m | m | m |
| 7.3 | m | m | m | m, dir, del | m, dir, del | m, dir, c, del | m, dir, del | m, dir, del | m | m | m | m | m | m | m | m | m | m | m | m | m | m | m |
| 7.4 | m | m | m | m, dir, del | m, dir, del | m, dir, c, del | m, dir, del | m, dir, del | m | m | m | m | m | m | m | m | m | m | m | m | m | m | |
| 7.5 | m | m | m | m | m, dir, del | m, dir, del | m, dir, c, del | m, dir, del | m, del | m | m | m | m | m | m | m | m | m | m | m | m | m | |
| 7.6 | m | m | m | m | m | m, dir, del | m, dir, del | m, dir, c, del | m, del | m, del | m | m | m | m | m | m | m | m | m | m | m | m | |
| 7.7 | m | m | m | m | m | m | m, del | m, del | m, c, del | m, del | m, del | m | m | m | m | m | m | m | m | m | m | m | |
| 7.8 | m | m | m | m | m | m | m | m, del | m, del | m, c, del | m, del | m, del | m | m | m | m | m | m | m | m | m | m | |
| 7.9 | m | m | m | m | m | m | m | m | m, del | m, del | m, c, del | m, del | m, del | m | m | m | m | m | m | m | m | m | |
| 7.10 | m | m | m | m | m | m | m | m | m | m, del | m, del | m, c, del | m, del | m, del | m | m | m | m | m | m | m | m | |
| 7.11 | m | m | m | m | m | m | m | m | m | m | m, del | m, del | m, c, del | m, del | m, del | m | m | m | m | m | m | m | |
| 7.12 | m | m | m | m | m | m | m | m | m | m | m | m, del | m, del | m, c, del | m, del | m, del | m | m | m | m | m | m | |
| 7.13 | m | m | m | m | m | m | m | m | m | m | m | m | m, del | m, del | m, c, del | m, del | m, del | m | m | m | m | m | |
| 8.0 | m | m | m | m | m | m | m | m | m | m | m | m | m, del | m, del | m, c, del | m, del | m, del | m | m | m | m | ||
| 8.1 | m | m | m | m | m | m | m | m | m | m | m | m | m | m, del | m, del | m, c, del | m, del | m, del | m | m | m | ||
| 8.2 | m | m | m | m | m | m | m | m | m | m | m | m | m | m | m, del | m, del | m, c, del | m, del | m, del | m | m | ||
| 8.3 | m | m | m | m | m | m | m | m | m | m | m | m | m | m | m | m, del | m, del | m, c, del | m, del | m, del | m | ||
| 8.4 | m | m | m | m | m | m | m | m | m | m | m | m | m | m | m | m | m, del | m, del | m, c, del | m, del | m, del | ||
| 8.5 | m | m | m | m | m | m | m | m | m | m | m | m | m | m | m | m | m | m, del | m, del | m, c, del | m, del | ||
| 8.6 | m | m | m | m | m | m | m | m | m | m | m | m | m | m | m | m | m | m | m, del | m, del | m, c, del | ||
c - collection replication, dir - directory replication, del - delta (Low-bandwidth optimization) replication, m - MFR and MRepl
Additional Information
Prerequisites for replication configuration
Before configuring a replication, review the following prerequisites to minimize initial data transfer time, prevent overwriting of
data, so forth
● Contexts - Determine the maximum number of contexts for your DD systems by reviewing the replication streams numbers in Best practices for data streams sent to DD systems.
Data Domain - Best practices for data streams sent to DD systems with DDOS 7.x.
Data Domain - Best practices for data streams sent to DD systems with DDOS 8.x
● Compatibility - If you are using DD systems running different versions of DDOS, review the next section on Replication Version Compatibility.
● Initial Replication - If the source holds a lot of data, the initial replication operation can take many hours. Consider putting both DD systems in the same location with a high-speed, low-latency link. After the first replication, you can move the systems to their intended locations because only new data will be sent.
● Bandwidth Delay Settings - Both the source and destination must have the same bandwidth delay settings. These tuning controls benefit replication performance over higher latency links by controlling the TCP (transmission control protocol) buffer size. The source system can then send enough data to the destination while waiting for an acknowledgment.
● Adequate Storage - At a minimum, the destination must have the same amount of space as the source.
● Security - DDOS requires that port 3009 be open in order to configure secure replication over an Ethernet connection.