• No results found

EFFICIENCY TECHNIQUES TO ACHIEVE END-TO-END STORAGE CAPACITY REDUCTION

N/A
N/A
Protected

Academic year: 2021

Share "EFFICIENCY TECHNIQUES TO ACHIEVE END-TO-END STORAGE CAPACITY REDUCTION"

Copied!
16
0
0

Loading.... (view fulltext now)

Full text

(1)

NETAPP W

The N

Larry Free July, 2011

EFFICIE

END-TO

WHITE PAP

NetApp

man, NetApp | WP-7022-0

NCY TECH

-END STO

ER

p Storag

p, Inc.

0711

HNIQUES T

RAGE CAP

ge Effic

TO ACHIEV

PACITY RE

ciency

VE

EDUCTION

Guide

(2)

The NetApp Storage Efficiency Guide 2

Table of Contents

1  EXECUTIVE SUMMARY ... 3 

2  STORAGE EFFICIENCY OVERVIEW ... 4 

3  MEASURING STORAGE EFFICIENCY ... 5 

4  EFFICIENCY (OR INEFFICIENCY) BEGINS WITH THE CREATION OF DATA ... 7 

5  THIN PROVISIONING ... 8 

6  VIRTUAL CLONING ... 9 

7  DATA REPLICATION AND BACKUP ... 10 

8  DEDUPLICATION ... 11 

9  DATA COMPRESSION... 12 

10 EFFICIENT USE OF HIGH CAPACITY DRIVES ... 13 

11 IMPROVING THE EFFICIENCY OF NON-NETAPP STORAGE ... 14 

12 CONCLUSION ... 15 

USER CASE STUDY 1: FLEXCLONE ... 16 

USER CASE STUDY 2: DEDUPLICATION ... 16 

(3)

The NetApp Storage Efficiency Guide 3

1 EXECUTIVE

SUMMARY

Several dynamics impact the way organizations approach IT purchasing decisions today. Lingering global financial uncertainty in the post-recession era has forced data center managers to re-evaluate their budgets and eliminate unnecessary IT spending. At the same time,

environmental concerns continue to plague facilities managers, who are concerned with the cost and availability of power, cooling, and space required by today’s growing IT infrastructure. While IT Managers wrestle with these concerns, data continues to grow. By some estimates, the creation of a typical business file initiates a chain of events that causes that file to be copied well over 1,000 times in its lifetime. If the file is an image of a popular entertainer or a video clip of a sports figure making a heroic play, perhaps tens of thousands of copies will be quickly distributed around the globe. How does this affect data storage in enterprise data centers? Have your users downloaded images and videos and completely forgotten about them? Do your users refuse to delete old files because “you never know if you might need them?” Are you— the system administrator—reluctant to purge data volumes because no one is quite sure who the owner of the data is, and what it’s used for? If you answered any of these questions in the affirmative, you are not alone. The majority of system administrators are grappling today with the constant creep of data throughout the data center. Unfortunately, there is no convenient trash can that you can throw your data rubbish into.

There are many ways to attack the problem of data proliferation. First, you could demand that your accountants, engineers, managers, technicians, and executive staff immediately delete all their old unused data files. Hmmm—that went over well, didn’t it? Well, you could implement a search and classify mechanism in your data center to automatically move “stale” files to a disk archival system. This frees up room on your primary storage systems, but all that data still resides somewhere, and is still consuming large quantities of disk drive space.

Finally, you could take advantage of existing storage efficiency techniques to manage the growth of your data, allowing you to retire legacy storage systems, postpone the purchase of new storage systems, and purchase smaller storage systems to begin with. You may not be able to control the behavior of your users or the pace of data growth, but you can control the efficiency of the storage systems that store this data.

This paper is a guide to help you understand how NetApp can enable maximum storage efficiency that will allow you to store all your data and accommodate rapid data growth without straining your people or your budgets.

(4)

The NetApp Storage Efficiency Guide 4

2

STORAGE EFFICIENCY OVERVIEW

Simply stated, storage efficiency enables you to store the maximum amount of data in the smallest possible space and at the lowest possible cost. NetApp Snapshot™ technology, introduced in 1992, was arguably the first widely-used storage efficiency feature available on disk-based enterprise storage systems. Snapshot copies enabled system administrators to create many point-in-time copies of their entire data volumes, but consumed only a fraction of the space that would have normally been required to make backup copies of these volumes.

Snapshot copies were a disruptive technology; they caused a change in behavior of system administrators by allowing them to back up their volumes more frequently than ever before— once per minute, once per hour, once per day—it didn’t matter, because these backups were simply virtual copies that consumed very little disk space.

Today, NetApp Snapshot technology has matured into an extensive suite of virtualized tools that enable system administrators to effectively provision their primary storage, manage test and development clone copies, reduce the size of point-in-time backup copies, replicate these copies across LANs and WANs, and reduce overall storage requirements by eliminating redundant data blocks.

(5)

The Net 5

3 MEA

Just how d debated fo saves time larger ones certain. Ti Time to de something context of systems.

Capacity O

When disc 1. Ra

se 2. Sy sy da 3. St

co

4. St sto 5. Av co Below is a

Notice on t Capacity b compressio actually is.

App Storage Effi

ASURING S

do you measu or many years e. In the conte

s certainly sa me to provisi eploy applicat we may even reducing stor

Optimization is cussing optimi

aw Capacity

-tup is done ystem Reserv

stem overhea ata

orable Capa

ould be used t ored Capacit ored on the sy vailable to St

uld be stored graphical mo

the model abo bar. This is w

on, virtual clo Storable Ca

iciency Guide

STORAGE

ure storage ef s at NetApp. ext of storage ves money - on? Time to ions? Putting ntually captur rage capacity

s a good way ization, it's he - This is a tota

ve Capacity

-ad, RAID pari city - After th to store user d

ty - Once use ystem. tore Capacity d on the syste

odel that visua

Figure

ove that the S here capacity ones, and sna apacity is ther

EFFICIENC

fficiency? Be One view is t e, using small but the time c backup/resto g a value on t re, but in this requirements

y to describe w elpful to break al addressabl

- This is the c ty and spare he setup is co

data

er data is writt y - this is the m before it fil alizes each of

e 1) The Storag

Storable Capa y optimization apshot copies

refore an estim

CY

lieve it or not that efficiency

ler systems to component of ore? Time to

time and then paper we will s and saving

what NetApp k storage cap e capacity of capacity requ

drives. This mplete - this tten, this is the

estimated am ls up

f the above c

ge Efficiency M

acity bar exte n is factored.

make the sto mation of the

(Compared

, this is a topi y is anything t o do the work f storage effic read and writ n trying to mea

l discuss stor money by us

does with sto pacity into 5 ca

the storage s ired during se capacity is no is the total es e amount of d mount of addit

ategories:

Model.

ends to the rig Features like orage system effective amo

d to Raw Capacit

ic that has be that saves mo k of

ciency is a littl te production asure time eff rage efficiency ing smaller st

orage capacity ategories: system, befor etup for things

ot available fo stimated capa data that is cu

tional user da

ght beyond th e deduplicatio m appear large

ount of data t

ty) een oney or le less data? fficiency is

y in the torage y. re any s like or user acity that urrently ata that e Raw on,

er than it that could

(6)

The NetApp Storage Efficiency Guide 6

be stored if efficiencies were enabled. Turn on the efficiencies, and the Storable Capacity bar moves to the right, turn off efficiencies, and Storable Capacity bar moves back to the left. Storable Capacity is similar to the "Miles to Empty" indication used in many cars today. When you fill the tank, the display might indicate that you can drive 350 miles until the fuel tank is empty. That figure is an estimate based on average driving conditions for that car. If you drive with either a heavy foot or a light touch, your mileage to empty will end up being less or more than 350 miles. As you drive, the car's computer continuously updates and become more accurate as you approach zero miles, based on your driving habits.

Similarly, Storable Capacity is an estimate of the amount of data the storage system could hold based on average use of efficiencies. As data is stored on the system, calculations are updated based on the actual efficiencies in use and their effect on the data. As more and more data is stored, the Storable Capacity estimation becomes more and more accurate.

A reasonable goal for system administrators is to insure that all storage systems operate at 100% or greater efficiency, as the graphic model above demonstrates. 100% efficiency is attainable even with modest implementation of NetApp’s storage efficiency technologies, described in the remainder of this paper.

(7)

The NetApp Storage Efficiency Guide 7

4

EFFICIENCY (OR INEFFICIENCY) BEGINS WITH THE CREATION OF

DATA

It is nearly impossible to predict how long any data file will be retained on disk. All data begins its life on primary storage. Whether it be a database entry, user file, software source code file, or email attachment, this data consumes physical space on a disk drive somewhere within your primary storage environment. Traditionally, the creation of data on primary storage begins a chain of events that lead to storage inefficiencies.

One of the first problems a storage system administrator faces is quota allocation. How much physical storage space should be assigned for each particular user or application? Knowing that an overflowing data volume (or LUN) has many unpleasant side effects, system administrators commonly overprovision their quotas and applications. For instance, if they believe that an application will require a single terabyte, they might decide to allocate 2TB to accommodate growth over time, or to adjust for a miscalculation of the storage space actually consumed by the application.

But what if the application does not grow as expected, or the miscalculation was on the short side? The result is wasted space—space that cannot be used by any other application. By some estimates, an average 60% of primary disk storage remains unused simply because of this type of overprovisioning.

This pattern of guesswork and resulting inefficiencies is not limited only to primary storage. Ineficiencies begin to propogate across all storage tiers: replication copies, backup copies and archival copies can all suffer the same fate as primary storage: improper utilization.

(8)

The Net 8

5 THIN

NetApp se provisionin that appea FlexVol tec capacity si requiremen The bottom include bud requiremen

App Storage Effi

N PROVISIO

t out to solve ng. NetApp F ar to be a cert chnology prov

zing. Data vo nts change. m-line impact

dget savings nts.

Figure 2) Thin

iciency Guide

ONING

the problem lexVolTM

techn ain size but a vides substan olumes can be

of FlexVol is as well as rel

n Provisioning A

of overprovis nology enable are in reality m ntial improvem e sized and re a dramatic re lated savings

Allows for “Jus

sioning with a es users to cr much smaller ments in stora esized quickly eduction in ph s in data cente

st-In-Time” Volu

technique kn reate flexible physically. age provisioni

y and dynami hysically alloc er space, pow

ume and LUN P

now as thin volumes and ing, utilization ically as appli cated storage wer, heat, and

Provisioning.

d LUNs n, and

ication . Benefits d cooling

(9)

The Net 9

6

VIRT

Often, syst essential e multiple sim In addition and model space. To address feature. U achieves s are needed FlexClone This is acc changes b and is utiliz copies can simulations

App Storage Effi

TUAL CLON

tem administr enterprise test mulations aga , organization ing usually in s this issue, N

sing a techniq storage efficie

d.

technology e complished by

etween a par zed by both th n be created f

s and compar

Figure 3)

iciency Guide

NING

rators are req t operations, ainst large da ns that rely on ncur large cos

NetApp turned que sometime ency for applic enables multip y creating a v rent volume a he primary ap from a single

re the charac

Using FlexClo

quired to alloc such as bug f tasets, and re n large-scale sts associated

d to Snapsho es referred to cations in whi ple, instant da irtual copy of nd a clone. A pplication and primary datas teristics of ea

one to Create V

cate substanti fix testing, pla emote office s simulations fo d with provisio t technology, o as “writable ich temporary ataset clones f the primary d All unchanged d the seconda set, enabling ach dataset af

Virtual Test and

al primary sto atform and up software stag or comprehen oning addition in the form o e” Snapshot c y, writable cop

with minimal dataset and s d data remain ary clone copy

users to perfo fter the simula

d Development

orage capacit pgrade check ging.

nsive testing, nal primary st of the FlexClo copies. FlexCl pies of data v storage over storing only th s on primary y. Multiple clo orm multiple ations are co

t Copies. ty for ks, analysis, torage neTM lone volumes rhead. he data storage, one mplete.

(10)

The Net 10

7 DATA

Global ente disasters, o efficient me protection of dollars o Exceptiona recovery a at high spe availability to one or m current and At the core performed defined int changed b is received resulting in By replicat significantl described secondary infrastructu Similarly, S changed s backups du is moved o

Figu

App Storage Effi

A REPLICA

erprises need operator erro ethod of distr and distributi of lost revenu ally powerful,

nd data distri eeds over a L and fastest r more NetApp d available fo e of SnapMirro

between the ervals, Snaps locks are sen d at the destin n a full mirror ting only the d

y reduces ne later in this pa

system, and ure cost of da SnapVault® p ince the last b uring the day or stored.

ure 4) SnapVa

iciency Guide

ATION AN

d to protect an rs, and techn ibuting data t on strategy, o e.

yet easy to u bution solutio LAN or a WAN recovery for m storage syste r disaster rec or software is SnapMirror s shot copies a nt incrementa nation, the cha

copy of the s data that has twork bandw aper, facilitate

during the da ata replication protects data a

backup, not e . Storage cap

ult and SnapM

D BACKUP

nd quickly rec ology and ap o and from re operations ca use and admin

on that today’s N, SnapMirror mission-critica ems, and con covery. s its storage e source and Sn

re taken of th lly over the ne anged blocks ource system changed sinc idth requirem es further spa ata transfer be

and disaster at the block le entire files. Th pacity require

irror Enable Sp

P

cover data in pplication failu emote location an be brought

nister, SnapM s global enter r software pro al applications tinually updat efficient desig napMirror des he source sys

etwork to the s are merged m.

ce that last Sn ments. Data c

ace reduction etween the tw r recovery.

evel–copying his means tha

ments are red

pace-Efficient B

the event of n ures. They als

ns. Without a to a standsti Mirror® delive rprise require ovides the hig s. SnapMirror tes the mirror n. First, a bas stination syste stem, and only destination s with the exist napshot copy ompression a at the primar wo systems. only the data at you can tak

duced becaus

Backup and Di

natural and m so need a spa an effective da ll, resulting in rs the disaste es. By replicat ghest possible r software mir red data to ke seline mirror ems. Next, at y the new and system. When ting data bloc y, SnapMirror and deduplica ry system, the

The result is a blocks that h ke more frequ

se no redund

saster Recove man-made ace ata n millions er ting data e data rrors data eep it is t user-d

n the data cks, ation, e s lowered have uent ant data ery.

(11)

The Net 11

8 DED

Remembe having wat fetch his w which soon the broom continue to arrives and In this stor administra grow ever proliferatio control it. N average U duplicate d duplicate d storage res NetApp ded “signature,” duplicate blo wide variety volumes. By

App Storage Effi

UPLICATIO

r this well-kno tched his mas water. Once th n overflows h

with an ax. N o proliferate. W d calls the bro

y, the appren tors often hav larger. As me n. Once data NetApp dedup

NIX® or Wind data objects. A data objects b

sources. NetA

Fig duplication divid which is comp ock is discarde y of applications

y implementing

iciency Guide

ON

own scene fro ster ply his cr he water is fet is basin and s Naturally (or s

Water, water ooms to a hal ntice felt the fu

ve the same f entioned in th is created, it plication is yo dows® enterp As these obje begin to prolife

App deduplica

gure 5) NetApp des newly store pared to all othe ed and its disk s s and file types g deduplication

om The Sorce aft (but not qu tched, the ass shows no sign hould we say everywhere. t.

ull effect of pr feeling of help

e opening se seems to mu our magic cure prise disk volu ects are modif erate at an al ation helps to

Deduplication ed data objects er signatures in space is reclaim s, including dat

, customers ca

erer’s Appren uite closely e sistant forgets

n of stopping y, supernatura

Just when all roliferation, an plessness as

ction, redund ultiply faster th

e to stop the ume contains fied, distribute arming rate. T o prevent this

Removes Dat s into small blo n the data volu med. Deduplica ta backup, data an reclaim up to

ntice? A magic nough) casts s the incantat . Desperate, ally) the halve

l hope seems nd was powe

they watch th dancy is a roo

han you, the spread of dat s thousands o ed, backed u The result is inefficiency.

ta Redundancie ocks. Each bloc

me. If an exact ation can be im a archiving, and o 95% of their s

cian's assista a spell on a tion to stop th

the apprentic es all come to s lost, the mas

rless to stop i heir data volu ot cause of da apprentice, c ta redundancy or even million

p, and archiv inefficient use

es

ck of data has a t block match e mplemented ac d unstructured storage space! ant, broom to he broom, ce attacks o life and

ster it. System umes ata can y. The ns of ed, e of a digital exists, the cross a data !

(12)

The Net 12

9 DATA

Data comp Virtual Tap software p which has provides a enters the individually format; oth selectively performanc

Fig bo

App Storage Effi

A COMPR

pression algor pe Libraries.

erformance p prevented wi n optimal bala

storage syste y for compres herwise it is al as needed, N ce penalty.

gure 6) All NetA th block and fil

iciency Guide

ESSION

rithms have b Data compre penalty or req despread use ance by using em, it is fashio ssibility. If a g

llowed to pas NetApp data c

App storage eff e data

been used for ssion, while e uires the use e on primary s g tried-and-tru oned into 32K group is deem s through in i compression

ficiency feature

r decades in t effective in re of expensive storage syste ue software c K compressio med compress

its original for offers substa

es, including da

ape devices a ducing data c e hardware co ems. NetApp compression w on groups. Ea

sible, it is stor rm. By comp antial savings

ata compressio

and more rec capacity, exac omponents –

data compre with a twist. A ach group is t red in its com ressing data without a sub

on, operate with

cently in cts a high

both of ession

As data tested

pressed bstantial

(13)

The Net 13

10 EFFI

High capac are two co SATA drive Secondly, rates. NetApp ad RAID-DP a drive failur automatica drive spee By combin paradigm – per GB as

App Storage Effi

ICIENT US

city SATA dis ncerns that h es have a rep SATA drives ddresses thes

and Flash Ca es without da ally promotes ds by placing ing SATA driv – high density well as reduc

Figure 7) Ne speed cache

iciency Guide

E OF HIGH

sk drives are t ave prevente putation of be are slower th e concerns b che. RAID-D ata loss – and “hot” data int g frequently ac

ves with RAID y drives used ctions in powe

etApp Flash Ca e

H CAPACIT

the undispute ed them from ing less reliab han 15K drive

y combining S DP provides a

d without a sig to a virtual sto ccessed data D-DP and Fla for high perfo er, space and

che automatica

TY DRIVES

ed price leade being used fo ble than 15K es because of SATA drives dditional devi gnificant perfo orage tier, red a into a fast so ash Cache, Ne ormance app d cooling requ

ally promotes “

S

er in cost per G or enterprise a

rpm Fibre Ch f slower rpm a with two impo ice protection ormance pena ducing the de olid-state mem

etApp brings lications. The uirements.

“hot” data to hig

GB; however applications. hannel or SAS

and actuator a ortant techno n by tolerating alty. Flash C ependency on mory cache.

to market a n e result is low

gh-r, there First, S drives.

access logies: g dual

ache n disk new wer cost

(14)

The Net 14

11 IMPR

As system systems, a too.” The N virtualizatio protocols u can be virt and others apply all th

App Storage Effi

ROVING TH

administrato a common com NetApp V-Ser

on solution th under a comm

ualized under s are supporte he software ef

iciency Guide

HE EFFICIE

rs implement mment is, “I w ries gateway s at unifies bloc mon architectu r one interfac ed behind the fficiencies des

Figure 8) Usi

ENCY OF N

and realize t wish I could a system allows ck and file (FC ure. With V-S ce. Storage sy

V-Series con scribed in this

ing V-Series w

NON-NETA

the value of st pply this effic s just that; it i C, FCoE, iSC Series system

ystems from H ntroller. With s paper to you

with Non-NetA

APP STORA

torage efficie ciency to my n

is the first and CSI, CIFS, NF s, your entire HDS, HP, EM a V-Series sy ur non-NetAp

App Storage.

AGE

ncy on their N non-NetApp s

d only storage FS) storage n e storage infra MC, 3PAR, Fu ystem, you ar pp systems.

NetApp storage

e

etworking astructure jitsu, IBM re able to

(15)

The NetApp Storage Efficiency Guide 15

12 CONCLUSION

Data proliferation is a fact of life. Harnessing the spread of data is a near impossibility, but correcting provisioning inefficiencies; managing storage allocation for test and development, data backup, data

replication; and eliminating data redundancies are well within the grasp of system administrators with today’s storage efficiency tools. NetApp provides many products and features that enable space-efficient storage, resulting in buying less storage with NetApp:

• Snapshot: Point-in-time file-system views

• Thin provisioning: Just in time storage for provisioning efficiencies • FlexClone: Writable test and development copies

• SnapMirror/SnapVault: Efficient data replication and backup using Snapshot technology • NetApp deduplication: General-purpose deduplication for removal of redundant data objects • NetApp Data Compression: Software data compression without significant performance degradation • SATA/RAID-DP/Flash Cache: Use high density storage for high performance applications

• V-Series: NetApp space efficiencies brought to non-NetApp storage

As demonstrated in the following user case studies, implementing NetApp storage efficiencies can have a significant impact on bottom-line expenses as they relate to the cost of storage acquisition as well as the ongoing costs of data storage management.

(16)

The NetApp Storage Efficiency Guide 16

USER CASE STUDY 1: FLEXCLONE

Twice a year, a leading provider of learning tools and course management systems releases upgrades of its online learning applications. To enable customers to test their customizations of these applications, the company has a shared test and development infrastructure based on NetApp storage systems. Test and development engineers use these environments to update application code, update the NetApp storage environment, test configurations, and issue security patches and fixes.

Developers use NetApp FlexClone to make working copies of the preproduction data. These cloned copies take up almost no additional storage space. NetApp Snapshot technology enables developers to make point-in-time copies of the data. “The ease of setting up a test and

development system, especially with the FlexClone technology, is almost immeasurable compared to what we were doing previously,” explains this customer. “It used to take 36 hours to make a working copy of our largest client’s database. With FlexClone, it takes less than an hour, a reduction of more than 97%.”

USER CASE STUDY 2: DEDUPLICATION

A major multimedia company is also a long-time NetApp customer. Among other applications, this company has 3 SQL servers with a total capacity of 2TB. These databases are considered

essential to operations, containing customer billing information. From the main data center, all three SQL databases are backed up nightly to a NetApp storage system in a second location. From that location, the three databases are again backed up to a third location for disaster recovery (DR) and archiving.

This company wanted to eliminate all tape backups and instead use NetApp for disk-to-disk backup and disaster recovery. Because of the large database size and the requirement to keep 16 backup copies online at all times, they were also interested in reducing disk space requirements.

Proof-of-concept testing with NetApp deduplication validated that 40% to 50% volume space savings would occur consistently when deduplication was performed after the second nightly backup. Once the concept was proven, an automated script was developed. All database backups were saved to NetApp volumes in pairs. After the second nightly database backup, deduplication is run on the volume and a check is made to determine the new (reduced) volume space required. The volume is then resized automatically using FlexVol. This process continues until 8 volumes are created, with a total of 16 database copies. After that point, on subsequent backups, the first volume is deleted and a 17th volume is created, and so on.

The result of this implementation was a completely automated database backup process, and a 40% reduction in disk requirements, reducing the capacity requirement from 32TB to 19TB.

USER CASE STUDY 3: UTILIZATION IMPROVEMENT

NetApp is not only a producer but also a consumer of its storage systems. The NetApp IT group recently undertook a project to increase storage utilization. This project involved migrating from old, inefficiently used storage systems to new, more scalable systems utilizing data virtualization techniques. This consolidation yielded significant results:

• Average storage capacity utilization increased from 40% to 60% per volume • Storage footprint was reduced from 24.83 racks to 5.48 racks

• 50 storage systems were reduced to 10 storage systems • Direct power consumption decreased by 41,184 kWh per month • Annual electricity cost was reduced by $59,305

According to the Director of Facilities at NetApp, “NetApp is not only committed to providing customers with leading-edge data management techniques to reduce their data center power consumption, but also to decreasing our own energy usage with more energy-efficient technology. NetApp was facing several challenges, including growing space, cooling, and power constraints. Server and storage consolidation attacked the power consumption issue at the source.”

References

Related documents

The paper concludes that, as far as Christian proponents of capitalism interpret biblical thought, it can be made compatible with a reformed Christian-influenced

The key segments in the mattress industry in India are; Natural latex foam, Memory foam, PU foam, Inner spring and Rubberized coir.. Natural Latex mattresses are

So if we want to verify the file file.txt with its signature (file.sign), we need the related public key (public.key) and file in the same form of the original form of when the

sion that the shortfall in corporate taxes since 1986 is not the result of differences between the projected and actual effective rate, but rather due to factors that have reduced

Regarding barriers of PM, the mean scores were higher among physicians working in public hospitals (M=9.62, SD=2.06) compared with those working in educational

When a compatible medication is added to the Glucose Intravenous Infusion, the solution must be administered immediately.. Those additives known to be incompatible should not

[r]

An example Microsoft Windows Installer Transform file (.mst) with the required settings is available in the Resources folder on the Control Center CD under Unattended Installation....