SlideShare uma empresa Scribd logo
1 de 32
Baixar para ler offline
Selecting and Protecting the Right
SharePoint Backup Targets



    Sean McDonough
    Product Manager, SharePoint Products
    Idera
What we’ll cover

     • Understand backup targets
     • Define the SharePoint targets
     • Examine common related targets
     • Discuss a few esoteric targets and
       edge case scenarios
     • Wrap it all up
“How” versus “What”

• Most disaster recovery talks tend to focus
  on the “how” of DR
  • How to set up a DR farm or warm site
  • How to perform a backup and restore
  • How to establish high availability

• This presentation is about the “what”
  • What you should be protecting
  • What the viable strategies are for a given target
  • What you should do or avoid doing
Target talk

• What is a target?
  •   Targets are the “what”
  •   They can be protected
  •   Tangible – typically file(s)
  •   Can be described and referenced in a plan
  •   Prioritized for protection & recovery

• Many different target types
  • Some targets are common
  • Other targets vary by farm purpose and platform
    technologies in-use
Target talk

• Our focus: the technical
  (DR plan) targets
  •   What are they?
  •   Where do they reside?
  •   When are they important?
  •   Protection approaches*
  •   Special considerations and watch-outs

• Remember
  • Today’s focus is on the technical, but …
  • Targets should be driven by business
SharePoint targets

               • Content DBs
               • Central admin DB
               • Farm config DB
               • SSPs and service
                 applications
               • Search
Content databases

• Hands-down #1 target set
  • Houses the majority of your users’ content
  • Must protect; can’t be recreated if lost

• Where are they?
  • SQL Server (all those WSS_ databases)
  • At least one database per Web application

• Protection
  • (SharePoint) farm backups, SQL backups, high
    availability (HA) mechanisms, 3rd party tools

• Watch-outs: RBS pointers
Central admin content database

         • What is it?
           • Simply another content database
           • Houses Central Administration site
             collection
           • Usually 1st content DB with a GUID
           • Each farm gets its own when the farm is
             first created

         • Worth protecting?
           • Usually not*
Farm configuration database

• What is it?
  • Repository for farm-wide configuration data, web application
    settings, services information, and more

• Worth protecting?
  • With SP2007, generally not; with SP2010, usually yes!

• Where is it?
  • SQL Server (SharePoint_Config)

• Protection
  • Farm backups, SQL backups, HA
  • mechanisms, 3rd party tools, documentation1
SSPs and service applications

        • What are they?
          • A collection of services (Excel services, BDC,
            Managed Metadata, etc.) that are consumed
            by Web applications and their site collections

        • Worth protecting?
          • Yes for both SSPs and the majority of service
            applications

        • Where are they?
          • Simple answer: all over the place …
SSPs and service applications

        • No really – where are they?
          •   Many have one or more databases
          •   All have (farm) configuration data
          •   Most are backed by Windows services
          •   Service applications also have proxies
          •   Many differences from service to service

        • Protection
          • Recommended: protect as part of a farm
            backup (ideal) or categorically (e.g., SSP
            backup)
          • Optionally: protect databases and augment
            with documentation of settings and config
SSPs and service applications

        • Watch-outs
          • Service applications are complex and more
            than just a database to back up
          • Some services and service applications rely on
            external data that does not get included in
            “standard” backups; e.g., Single Sign-On
            service (2007) and the Secure Store Service
            application (2010)
          • Protection guidelines vary from service (app)
            to service (app)
Search

         • What is it?
           • A combination of databases and file system
             data used for search crawling, querying, and
             administration
           • Search is a somewhat special case of an SSP
             function/service application

         • Watch-outs
           • Backup synchronization of index partitions &
             crawl database is critical
           • Use either platform backup or a tool that
             engages the SPF-VSS Writer2
Related targets
          •   Solution packages
          •   SharePoint Root
          •   IIS configuration
          •   Certificates
          •   IIS web root
          •   GAC
          •   Registry
          •   Bits and bytes
Solution packages

• What are they?
  • .wsp files that are added to the farm to deploy
    custom code, Features, and capabilities
  • You are packaging your customizations and
    custom code this way … right?

• Worth protecting?
  • Absolutely. In many cases, backup is critical

• Protection
  • Varies (Centrally managed vs. decentralized)3
  • Basic file protection/backup
  • SP2010 provides configuration-only backup4
SharePoint Root

    • What is it?
      • The guts of SharePoint’s core file system
      • Also known as the 12-hive or SharePoint Root

    • Where is it?
      •   C:Program FilesCommon FilesMicrosoft
          SharedWeb Server Extensions14 (or 12)

    • Worth protecting?
      • Depends on Feature and customization usage

    • Protection
      • File system backup
IIS configuration
• What is it?
  • Settings used to serve web pages by IIS
  • Covers app pools, ports, protocols, etc.

• Where is it?
  • C:Windowssystem32inetsrv by default
    (IIS6 Metabase and IIS7.x config)

• Worth protecting?
  • Some of it, but redundancy w/ SharePoint exists

• Protection
  • File copy*, appcmd.exe*, documentation
Certificates

• What are they?
  • In most cases, support for SSL sites via HTTPS

• Where are they?
  • Certificate store (accessible via Certificates MMC snap-in)

• Worth protecting?
  • Yes

• Protection
  • Export from Certificates snap-in or IIS
    Manager as.PFX files
  • One time operation (until cert renewal)
IIS web root (for SharePoint)
• What is it?
  • Web files for each IIS site associated
    with a SharePoint Web application

• Where is it?
  • C:inetpubwwwrootwssVirtualDirectories

• Worth protecting?
  • Usually yes (web.config files, web part files*, etc)

• Protection
  • File system backup, documentation
GAC

• What is it?
  • The Microsoft .NET Framework Global Assembly Cache
  • Repository for shared libraries and native images

• Where it it?
  • By default, C:Windowsassembly

• Worth protecting?
  • Sometimes (typically for decentralized customizations)

• Protection
  • File system backup*
Registry

       • What is it?
           • Windows (OS) database for program info

       • Where is it?
           • C:Windows (System.dat, User.dat)
           • Usually accessed via tool (regedit.exe)

       • Worth protecting?
           • Yes for some branches (HKLMSOFTWARE
             MicrosoftOffice Server14.0...)

       • Protection
           • Regedit.exe export, documentation
Bits and bytes
• What are they?
  • The (often-forgotten) files and installers you
    need to rebuild a SharePoint environment
  • SharePoint setup files, OWAs, SPs, CUs,
    iFilter packs, SQL client install, etc.

• Worth protecting?
  • If your strategy involves rebuilding a
    SharePoint farm, it’s well worth the time

• Protection
  • External media/disks, replicated storage
Edge cases & esoteric targets
• .NET Framework config folders
• Remote BLOB storage (RBS)
• SQL Server transparent data
  encryption (TDE)
• External data sources
• Single server farm
.NET Framework config folders

• What are they?
  • System-wide configuration files and defaults in the.NET
    Framework installation folders

• Where are they?
  • C:WindowsMicrosoft.NETFrameworkv…Config
  • C:WindowsMicrosoft.NETFramework64v…Config

• Worth protecting?
  • Yes if you’ve altered machine.config or similar files

• Protection
  • File system backup, documentation
Remote BLOB storage

• What is it?
  • Alternate location where BLOBs are
    stored when RBS is in-use5

• Where is it?
  • Varies and depends on RBS provider

• Worth protecting?
  • Absolutely critical if you use RBS

• Protection
  • Varies; consult RBS provider guidance
SQL Server TDE

       • What is it?
         • TDE = Transparent Data Encryption6
         • Real-time encryption/decryption of SQL Server
           data and log files

       • Where is it?
         • SQL Server (master DB or EKM module)

       • Worth protecting?
         • Certificate + key protection is critical for TDE

       • Protection
         • Export followed by file backup is common
External data sources

• What is it?
  • Data that is consumed by SharePoint but resident elsewhere

• Where is it?
  • Examples include BCS external data sources and SQL Server
    Reporting Services databases

• Worth protecting?
  • Highly variable

• Protection
  • Varies by data source and platform
Single server farm

• If you have an all-in-one farm and want to
  maximize usage of the built-in platform tools
  • Use built-in Windows Server Backup (2008, 2008 R2)
  • Register the SharePoint VSS Writer
     • stsadm.exe –o registerwsswriter
  • Protects entire server, including consistent SP backups 7
  • Bare metal restore capability
Wrap-up

• Your targets are unique to your farm
  • Understand how your SharePoint environment is used
  • Use cases are a good starting point for technical targets

• There’s more than one protection strategy
  • Realistically, not everything has to be backed-up
  • Documentation can be a viable choice in some cases

• Protect your (content) databases!
  • Most important targets in your farm
  • Critical protection takes minutes. Just invest a little time8
References
1. “Document farm configuration settings (SharePoint Server 2010)”
   • http://tinyurl.com/SPDRFarmDoc2010
2. “Overview of SharePoint Foundation and the Volume Shadow Copy
   Service”
   • http://msdn.microsoft.com/en-us/library/cc264314.aspx
3. “Back up and restore customizations (Windows SharePoint Services)”
   • http://technet.microsoft.com/en-us/library/ee216349(office.12).aspx
4. “Configuration-Only Backup and Restore in SharePoint 2010”
   • http://sharepointinterface.com/2010/09/10/configuration-only-backup-and-
     restore-in-sharepoint-2010/
5. “Overview of Remote BLOB Storage (SharePoint Foundation 2010)”
   • http://technet.microsoft.com/en-us/library/ee748607.aspx
References
6. “Understanding Transparent Data Encryption (TDE)”
   • http://msdn.microsoft.com/en-us/library/bb934049.aspx
7. “Plan for backup and recovery (SharePoint Server 2010)”
   • http://technet.microsoft.com/en-us/library/cc261687.aspx
8. “Scheduling SQL backups for SharePoint”
   • http://www.toddklindt.com/blog/Lists/Posts/Post.aspx?ID=248
Finding me

Sean P. McDonough
    Blog: http://SharePointInterface.com
    Email: sean@SharePointInterface.com
    LinkedIn: http://www.linkedin.com/in/smcdonough
    Twitter: @spmcdonough



    The SharePoint 2007 Disaster Recovery Guide
    http://tinyurl.com/SPDRGuide2007


    The SharePoint 2010 Disaster Recovery Guide
    http://tinyurl.com/SPDRGuide2010

Mais conteúdo relacionado

Mais procurados

SQL Server goes Linux - Hello, my name is Tux, I would like to join the #SQLF...
SQL Server goes Linux - Hello, my name is Tux, I would like to join the #SQLF...SQL Server goes Linux - Hello, my name is Tux, I would like to join the #SQLF...
SQL Server goes Linux - Hello, my name is Tux, I would like to join the #SQLF...Andre Essing
 
Windows 7 Feature Overview It Academic Day 2009
Windows 7 Feature Overview   It Academic Day 2009Windows 7 Feature Overview   It Academic Day 2009
Windows 7 Feature Overview It Academic Day 2009Tobias Koprowski
 
Backup & recovery for exadata
Backup & recovery for exadataBackup & recovery for exadata
Backup & recovery for exadatasolarisyougood
 
Webinar NETGEAR - Acronis e Netgear le Best Practices per la protezione di si...
Webinar NETGEAR - Acronis e Netgear le Best Practices per la protezione di si...Webinar NETGEAR - Acronis e Netgear le Best Practices per la protezione di si...
Webinar NETGEAR - Acronis e Netgear le Best Practices per la protezione di si...Netgear Italia
 
KoprowskiT_SQLRelayNottingham_BackupAndRestoreAD2015
KoprowskiT_SQLRelayNottingham_BackupAndRestoreAD2015KoprowskiT_SQLRelayNottingham_BackupAndRestoreAD2015
KoprowskiT_SQLRelayNottingham_BackupAndRestoreAD2015Tobias Koprowski
 
Oracle Database Appliance
Oracle Database ApplianceOracle Database Appliance
Oracle Database ApplianceJay Patel
 
44spotkaniePLSSUGWRO_CoNowegowKrainieChmur
44spotkaniePLSSUGWRO_CoNowegowKrainieChmur44spotkaniePLSSUGWRO_CoNowegowKrainieChmur
44spotkaniePLSSUGWRO_CoNowegowKrainieChmurTobias Koprowski
 
Přehled portfolia Oracle Database Appliance a praktických případů v regionu EMEA
Přehled portfolia Oracle Database Appliance a praktických případů v regionu EMEAPřehled portfolia Oracle Database Appliance a praktických případů v regionu EMEA
Přehled portfolia Oracle Database Appliance a praktických případů v regionu EMEAMarketingArrowECS_CZ
 
ODA: What's New?
ODA: What's New?ODA: What's New?
ODA: What's New?O-box
 
Simplify IT: Oracle SuperCluster
Simplify IT: Oracle SuperCluster Simplify IT: Oracle SuperCluster
Simplify IT: Oracle SuperCluster Fran Navarro
 
Splitgraph: AHL talk
Splitgraph: AHL talkSplitgraph: AHL talk
Splitgraph: AHL talkSplitgraph
 
Nashville analytics summit aug9 no sql mike king dell v1.5
Nashville analytics summit aug9 no sql mike king dell v1.5Nashville analytics summit aug9 no sql mike king dell v1.5
Nashville analytics summit aug9 no sql mike king dell v1.5Mike King
 
Oracle Data Protection - 1. část
Oracle Data Protection - 1. částOracle Data Protection - 1. část
Oracle Data Protection - 1. částMarketingArrowECS_CZ
 
Storing billions of images in a hybrid relational and NoSQL database using Or...
Storing billions of images in a hybrid relational and NoSQL database using Or...Storing billions of images in a hybrid relational and NoSQL database using Or...
Storing billions of images in a hybrid relational and NoSQL database using Or...Aris Prassinos
 
Oracle databáze - zkonsolidovat, ochránit a ještě ušetřit! (1. část)
Oracle databáze - zkonsolidovat, ochránit a ještě ušetřit! (1. část)Oracle databáze - zkonsolidovat, ochránit a ještě ušetřit! (1. část)
Oracle databáze - zkonsolidovat, ochránit a ještě ušetřit! (1. část)MarketingArrowECS_CZ
 
Oracle Database appliance - Value proposition Webcast
Oracle Database appliance - Value proposition WebcastOracle Database appliance - Value proposition Webcast
Oracle Database appliance - Value proposition WebcastThanos TP
 
Oracle database 12c_and_DevOps
Oracle database 12c_and_DevOpsOracle database 12c_and_DevOps
Oracle database 12c_and_DevOpsMaria Colgan
 

Mais procurados (20)

SQL Server goes Linux - Hello, my name is Tux, I would like to join the #SQLF...
SQL Server goes Linux - Hello, my name is Tux, I would like to join the #SQLF...SQL Server goes Linux - Hello, my name is Tux, I would like to join the #SQLF...
SQL Server goes Linux - Hello, my name is Tux, I would like to join the #SQLF...
 
Windows 7 Feature Overview It Academic Day 2009
Windows 7 Feature Overview   It Academic Day 2009Windows 7 Feature Overview   It Academic Day 2009
Windows 7 Feature Overview It Academic Day 2009
 
Backup & recovery for exadata
Backup & recovery for exadataBackup & recovery for exadata
Backup & recovery for exadata
 
Webinar NETGEAR - Acronis e Netgear le Best Practices per la protezione di si...
Webinar NETGEAR - Acronis e Netgear le Best Practices per la protezione di si...Webinar NETGEAR - Acronis e Netgear le Best Practices per la protezione di si...
Webinar NETGEAR - Acronis e Netgear le Best Practices per la protezione di si...
 
KoprowskiT_SQLRelayNottingham_BackupAndRestoreAD2015
KoprowskiT_SQLRelayNottingham_BackupAndRestoreAD2015KoprowskiT_SQLRelayNottingham_BackupAndRestoreAD2015
KoprowskiT_SQLRelayNottingham_BackupAndRestoreAD2015
 
Oracle Database Appliance
Oracle Database ApplianceOracle Database Appliance
Oracle Database Appliance
 
44spotkaniePLSSUGWRO_CoNowegowKrainieChmur
44spotkaniePLSSUGWRO_CoNowegowKrainieChmur44spotkaniePLSSUGWRO_CoNowegowKrainieChmur
44spotkaniePLSSUGWRO_CoNowegowKrainieChmur
 
Přehled portfolia Oracle Database Appliance a praktických případů v regionu EMEA
Přehled portfolia Oracle Database Appliance a praktických případů v regionu EMEAPřehled portfolia Oracle Database Appliance a praktických případů v regionu EMEA
Přehled portfolia Oracle Database Appliance a praktických případů v regionu EMEA
 
SQL Azure for ITPros
SQL Azure for ITProsSQL Azure for ITPros
SQL Azure for ITPros
 
ODA: What's New?
ODA: What's New?ODA: What's New?
ODA: What's New?
 
Simplify IT: Oracle SuperCluster
Simplify IT: Oracle SuperCluster Simplify IT: Oracle SuperCluster
Simplify IT: Oracle SuperCluster
 
Splitgraph: AHL talk
Splitgraph: AHL talkSplitgraph: AHL talk
Splitgraph: AHL talk
 
Nashville analytics summit aug9 no sql mike king dell v1.5
Nashville analytics summit aug9 no sql mike king dell v1.5Nashville analytics summit aug9 no sql mike king dell v1.5
Nashville analytics summit aug9 no sql mike king dell v1.5
 
Oracle Data Protection - 1. část
Oracle Data Protection - 1. částOracle Data Protection - 1. část
Oracle Data Protection - 1. část
 
Storing billions of images in a hybrid relational and NoSQL database using Or...
Storing billions of images in a hybrid relational and NoSQL database using Or...Storing billions of images in a hybrid relational and NoSQL database using Or...
Storing billions of images in a hybrid relational and NoSQL database using Or...
 
Oracle databáze - zkonsolidovat, ochránit a ještě ušetřit! (1. část)
Oracle databáze - zkonsolidovat, ochránit a ještě ušetřit! (1. část)Oracle databáze - zkonsolidovat, ochránit a ještě ušetřit! (1. část)
Oracle databáze - zkonsolidovat, ochránit a ještě ušetřit! (1. část)
 
Oracle Database appliance - Value proposition Webcast
Oracle Database appliance - Value proposition WebcastOracle Database appliance - Value proposition Webcast
Oracle Database appliance - Value proposition Webcast
 
Anujit CV
Anujit CV Anujit CV
Anujit CV
 
Session 307 ravi pendekanti engineered systems
Session 307  ravi pendekanti engineered systemsSession 307  ravi pendekanti engineered systems
Session 307 ravi pendekanti engineered systems
 
Oracle database 12c_and_DevOps
Oracle database 12c_and_DevOpsOracle database 12c_and_DevOps
Oracle database 12c_and_DevOps
 

Destaque

Managing an soa environment with tivoli redp4318
Managing an soa environment with tivoli redp4318Managing an soa environment with tivoli redp4318
Managing an soa environment with tivoli redp4318Banking at Ho Chi Minh city
 
Implementing omegamon xe for messaging v6.0 sg247357
Implementing omegamon xe for messaging v6.0 sg247357Implementing omegamon xe for messaging v6.0 sg247357
Implementing omegamon xe for messaging v6.0 sg247357Banking at Ho Chi Minh city
 
Ibm total storage tape selection and differentiation guide sg246946
Ibm total storage tape selection and differentiation guide sg246946Ibm total storage tape selection and differentiation guide sg246946
Ibm total storage tape selection and differentiation guide sg246946Banking at Ho Chi Minh city
 
Tivoli key lifecycle manager for z os migration guide for the ibm encryption ...
Tivoli key lifecycle manager for z os migration guide for the ibm encryption ...Tivoli key lifecycle manager for z os migration guide for the ibm encryption ...
Tivoli key lifecycle manager for z os migration guide for the ibm encryption ...Banking at Ho Chi Minh city
 

Destaque (7)

Managing an soa environment with tivoli redp4318
Managing an soa environment with tivoli redp4318Managing an soa environment with tivoli redp4318
Managing an soa environment with tivoli redp4318
 
Implementing omegamon xe for messaging v6.0 sg247357
Implementing omegamon xe for messaging v6.0 sg247357Implementing omegamon xe for messaging v6.0 sg247357
Implementing omegamon xe for messaging v6.0 sg247357
 
20110804 ems intro_english
20110804 ems intro_english20110804 ems intro_english
20110804 ems intro_english
 
Ibm total storage tape selection and differentiation guide sg246946
Ibm total storage tape selection and differentiation guide sg246946Ibm total storage tape selection and differentiation guide sg246946
Ibm total storage tape selection and differentiation guide sg246946
 
Tivoli key lifecycle manager for z os migration guide for the ibm encryption ...
Tivoli key lifecycle manager for z os migration guide for the ibm encryption ...Tivoli key lifecycle manager for z os migration guide for the ibm encryption ...
Tivoli key lifecycle manager for z os migration guide for the ibm encryption ...
 
IBM MobileFirst Platform v7.0 Pot Intro v0.1
IBM MobileFirst Platform v7.0 Pot Intro v0.1IBM MobileFirst Platform v7.0 Pot Intro v0.1
IBM MobileFirst Platform v7.0 Pot Intro v0.1
 
IBM MobileFirst Platform v7 Tech Overview
IBM MobileFirst Platform v7 Tech OverviewIBM MobileFirst Platform v7 Tech Overview
IBM MobileFirst Platform v7 Tech Overview
 

Semelhante a Selecting And Protecting The Right Sharepoint Backup Targets Sps Michigan

1. SQL Server forSharePoint geeksA gentle introductionThomas Vochten • Septem...
1. SQL Server forSharePoint geeksA gentle introductionThomas Vochten • Septem...1. SQL Server forSharePoint geeksA gentle introductionThomas Vochten • Septem...
1. SQL Server forSharePoint geeksA gentle introductionThomas Vochten • Septem...BIWUG
 
CNIT 121: 13 Investigating Mac OS X Systems
CNIT 121: 13 Investigating Mac OS X SystemsCNIT 121: 13 Investigating Mac OS X Systems
CNIT 121: 13 Investigating Mac OS X SystemsSam Bowne
 
Backup and Disaster Recovery in Hadoop
Backup and Disaster Recovery in HadoopBackup and Disaster Recovery in Hadoop
Backup and Disaster Recovery in Hadooplarsgeorge
 
CNIT 152: 13 Investigating Mac OS X Systems
CNIT 152: 13 Investigating Mac OS X SystemsCNIT 152: 13 Investigating Mac OS X Systems
CNIT 152: 13 Investigating Mac OS X SystemsSam Bowne
 
Getting started with big data in Azure HDInsight
Getting started with big data in Azure HDInsightGetting started with big data in Azure HDInsight
Getting started with big data in Azure HDInsightNilesh Gule
 
How Teradata uses Stacki
How Teradata uses StackiHow Teradata uses Stacki
How Teradata uses StackiStackIQ
 
KYSUC - Keep Your Schema Under Control
KYSUC - Keep Your Schema Under ControlKYSUC - Keep Your Schema Under Control
KYSUC - Keep Your Schema Under ControlCoimbra JUG
 
002-Storage Basics and Application Environments V1.0.pptx
002-Storage Basics and Application Environments V1.0.pptx002-Storage Basics and Application Environments V1.0.pptx
002-Storage Basics and Application Environments V1.0.pptxDrewMe1
 
Webinar: Cloud Storage: The 5 Reasons IT Can Do it Better
Webinar: Cloud Storage: The 5 Reasons IT Can Do it BetterWebinar: Cloud Storage: The 5 Reasons IT Can Do it Better
Webinar: Cloud Storage: The 5 Reasons IT Can Do it BetterStorage Switzerland
 
PHD Virtual: Optimizing Backups for Any Storage
PHD Virtual: Optimizing Backups for Any StoragePHD Virtual: Optimizing Backups for Any Storage
PHD Virtual: Optimizing Backups for Any StorageMark McHenry
 
AUSPC 2013 - Business Continuity Management in SharePoint
AUSPC 2013 - Business Continuity Management in SharePointAUSPC 2013 - Business Continuity Management in SharePoint
AUSPC 2013 - Business Continuity Management in SharePointMichael Noel
 
Scalable Filesystem Metadata Services with RocksDB
Scalable Filesystem Metadata Services with RocksDBScalable Filesystem Metadata Services with RocksDB
Scalable Filesystem Metadata Services with RocksDBAlluxio, Inc.
 
Migrating On-Premises DBs to Cloud Systems
Migrating On-Premises DBs to Cloud SystemsMigrating On-Premises DBs to Cloud Systems
Migrating On-Premises DBs to Cloud SystemsChristopher Foot
 
Scalable and High available Distributed File System Metadata Service Using gR...
Scalable and High available Distributed File System Metadata Service Using gR...Scalable and High available Distributed File System Metadata Service Using gR...
Scalable and High available Distributed File System Metadata Service Using gR...Alluxio, Inc.
 
Scaling Security Workflows in Government Agencies
Scaling Security Workflows in Government AgenciesScaling Security Workflows in Government Agencies
Scaling Security Workflows in Government AgenciesAvere Systems
 
Introduction to Servers and Server Types.pptx
Introduction to Servers and Server Types.pptxIntroduction to Servers and Server Types.pptx
Introduction to Servers and Server Types.pptxHasankaNayanjith
 
Elastic storage in the cloud session 5224 final v2
Elastic storage in the cloud session 5224 final v2Elastic storage in the cloud session 5224 final v2
Elastic storage in the cloud session 5224 final v2BradDesAulniers2
 

Semelhante a Selecting And Protecting The Right Sharepoint Backup Targets Sps Michigan (20)

1. SQL Server forSharePoint geeksA gentle introductionThomas Vochten • Septem...
1. SQL Server forSharePoint geeksA gentle introductionThomas Vochten • Septem...1. SQL Server forSharePoint geeksA gentle introductionThomas Vochten • Septem...
1. SQL Server forSharePoint geeksA gentle introductionThomas Vochten • Septem...
 
CNIT 121: 13 Investigating Mac OS X Systems
CNIT 121: 13 Investigating Mac OS X SystemsCNIT 121: 13 Investigating Mac OS X Systems
CNIT 121: 13 Investigating Mac OS X Systems
 
Backup and Disaster Recovery in Hadoop
Backup and Disaster Recovery in HadoopBackup and Disaster Recovery in Hadoop
Backup and Disaster Recovery in Hadoop
 
Where to save my data, for devs!
Where to save my data, for devs!Where to save my data, for devs!
Where to save my data, for devs!
 
CNIT 152: 13 Investigating Mac OS X Systems
CNIT 152: 13 Investigating Mac OS X SystemsCNIT 152: 13 Investigating Mac OS X Systems
CNIT 152: 13 Investigating Mac OS X Systems
 
Getting started with big data in Azure HDInsight
Getting started with big data in Azure HDInsightGetting started with big data in Azure HDInsight
Getting started with big data in Azure HDInsight
 
How Teradata uses Stacki
How Teradata uses StackiHow Teradata uses Stacki
How Teradata uses Stacki
 
Architecting a datalake
Architecting a datalakeArchitecting a datalake
Architecting a datalake
 
KYSUC - Keep Your Schema Under Control
KYSUC - Keep Your Schema Under ControlKYSUC - Keep Your Schema Under Control
KYSUC - Keep Your Schema Under Control
 
002-Storage Basics and Application Environments V1.0.pptx
002-Storage Basics and Application Environments V1.0.pptx002-Storage Basics and Application Environments V1.0.pptx
002-Storage Basics and Application Environments V1.0.pptx
 
Webinar: Cloud Storage: The 5 Reasons IT Can Do it Better
Webinar: Cloud Storage: The 5 Reasons IT Can Do it BetterWebinar: Cloud Storage: The 5 Reasons IT Can Do it Better
Webinar: Cloud Storage: The 5 Reasons IT Can Do it Better
 
PHD Virtual: Optimizing Backups for Any Storage
PHD Virtual: Optimizing Backups for Any StoragePHD Virtual: Optimizing Backups for Any Storage
PHD Virtual: Optimizing Backups for Any Storage
 
AUSPC 2013 - Business Continuity Management in SharePoint
AUSPC 2013 - Business Continuity Management in SharePointAUSPC 2013 - Business Continuity Management in SharePoint
AUSPC 2013 - Business Continuity Management in SharePoint
 
Backup and Disaster Recovery in Hadoop
Backup and Disaster Recovery in Hadoop Backup and Disaster Recovery in Hadoop
Backup and Disaster Recovery in Hadoop
 
Scalable Filesystem Metadata Services with RocksDB
Scalable Filesystem Metadata Services with RocksDBScalable Filesystem Metadata Services with RocksDB
Scalable Filesystem Metadata Services with RocksDB
 
Migrating On-Premises DBs to Cloud Systems
Migrating On-Premises DBs to Cloud SystemsMigrating On-Premises DBs to Cloud Systems
Migrating On-Premises DBs to Cloud Systems
 
Scalable and High available Distributed File System Metadata Service Using gR...
Scalable and High available Distributed File System Metadata Service Using gR...Scalable and High available Distributed File System Metadata Service Using gR...
Scalable and High available Distributed File System Metadata Service Using gR...
 
Scaling Security Workflows in Government Agencies
Scaling Security Workflows in Government AgenciesScaling Security Workflows in Government Agencies
Scaling Security Workflows in Government Agencies
 
Introduction to Servers and Server Types.pptx
Introduction to Servers and Server Types.pptxIntroduction to Servers and Server Types.pptx
Introduction to Servers and Server Types.pptx
 
Elastic storage in the cloud session 5224 final v2
Elastic storage in the cloud session 5224 final v2Elastic storage in the cloud session 5224 final v2
Elastic storage in the cloud session 5224 final v2
 

Selecting And Protecting The Right Sharepoint Backup Targets Sps Michigan

  • 1. Selecting and Protecting the Right SharePoint Backup Targets Sean McDonough Product Manager, SharePoint Products Idera
  • 2. What we’ll cover • Understand backup targets • Define the SharePoint targets • Examine common related targets • Discuss a few esoteric targets and edge case scenarios • Wrap it all up
  • 3. “How” versus “What” • Most disaster recovery talks tend to focus on the “how” of DR • How to set up a DR farm or warm site • How to perform a backup and restore • How to establish high availability • This presentation is about the “what” • What you should be protecting • What the viable strategies are for a given target • What you should do or avoid doing
  • 4. Target talk • What is a target? • Targets are the “what” • They can be protected • Tangible – typically file(s) • Can be described and referenced in a plan • Prioritized for protection & recovery • Many different target types • Some targets are common • Other targets vary by farm purpose and platform technologies in-use
  • 5. Target talk • Our focus: the technical (DR plan) targets • What are they? • Where do they reside? • When are they important? • Protection approaches* • Special considerations and watch-outs • Remember • Today’s focus is on the technical, but … • Targets should be driven by business
  • 6. SharePoint targets • Content DBs • Central admin DB • Farm config DB • SSPs and service applications • Search
  • 7. Content databases • Hands-down #1 target set • Houses the majority of your users’ content • Must protect; can’t be recreated if lost • Where are they? • SQL Server (all those WSS_ databases) • At least one database per Web application • Protection • (SharePoint) farm backups, SQL backups, high availability (HA) mechanisms, 3rd party tools • Watch-outs: RBS pointers
  • 8. Central admin content database • What is it? • Simply another content database • Houses Central Administration site collection • Usually 1st content DB with a GUID • Each farm gets its own when the farm is first created • Worth protecting? • Usually not*
  • 9. Farm configuration database • What is it? • Repository for farm-wide configuration data, web application settings, services information, and more • Worth protecting? • With SP2007, generally not; with SP2010, usually yes! • Where is it? • SQL Server (SharePoint_Config) • Protection • Farm backups, SQL backups, HA • mechanisms, 3rd party tools, documentation1
  • 10. SSPs and service applications • What are they? • A collection of services (Excel services, BDC, Managed Metadata, etc.) that are consumed by Web applications and their site collections • Worth protecting? • Yes for both SSPs and the majority of service applications • Where are they? • Simple answer: all over the place …
  • 11. SSPs and service applications • No really – where are they? • Many have one or more databases • All have (farm) configuration data • Most are backed by Windows services • Service applications also have proxies • Many differences from service to service • Protection • Recommended: protect as part of a farm backup (ideal) or categorically (e.g., SSP backup) • Optionally: protect databases and augment with documentation of settings and config
  • 12. SSPs and service applications • Watch-outs • Service applications are complex and more than just a database to back up • Some services and service applications rely on external data that does not get included in “standard” backups; e.g., Single Sign-On service (2007) and the Secure Store Service application (2010) • Protection guidelines vary from service (app) to service (app)
  • 13. Search • What is it? • A combination of databases and file system data used for search crawling, querying, and administration • Search is a somewhat special case of an SSP function/service application • Watch-outs • Backup synchronization of index partitions & crawl database is critical • Use either platform backup or a tool that engages the SPF-VSS Writer2
  • 14. Related targets • Solution packages • SharePoint Root • IIS configuration • Certificates • IIS web root • GAC • Registry • Bits and bytes
  • 15. Solution packages • What are they? • .wsp files that are added to the farm to deploy custom code, Features, and capabilities • You are packaging your customizations and custom code this way … right? • Worth protecting? • Absolutely. In many cases, backup is critical • Protection • Varies (Centrally managed vs. decentralized)3 • Basic file protection/backup • SP2010 provides configuration-only backup4
  • 16. SharePoint Root • What is it? • The guts of SharePoint’s core file system • Also known as the 12-hive or SharePoint Root • Where is it? • C:Program FilesCommon FilesMicrosoft SharedWeb Server Extensions14 (or 12) • Worth protecting? • Depends on Feature and customization usage • Protection • File system backup
  • 17. IIS configuration • What is it? • Settings used to serve web pages by IIS • Covers app pools, ports, protocols, etc. • Where is it? • C:Windowssystem32inetsrv by default (IIS6 Metabase and IIS7.x config) • Worth protecting? • Some of it, but redundancy w/ SharePoint exists • Protection • File copy*, appcmd.exe*, documentation
  • 18. Certificates • What are they? • In most cases, support for SSL sites via HTTPS • Where are they? • Certificate store (accessible via Certificates MMC snap-in) • Worth protecting? • Yes • Protection • Export from Certificates snap-in or IIS Manager as.PFX files • One time operation (until cert renewal)
  • 19. IIS web root (for SharePoint) • What is it? • Web files for each IIS site associated with a SharePoint Web application • Where is it? • C:inetpubwwwrootwssVirtualDirectories • Worth protecting? • Usually yes (web.config files, web part files*, etc) • Protection • File system backup, documentation
  • 20. GAC • What is it? • The Microsoft .NET Framework Global Assembly Cache • Repository for shared libraries and native images • Where it it? • By default, C:Windowsassembly • Worth protecting? • Sometimes (typically for decentralized customizations) • Protection • File system backup*
  • 21. Registry • What is it? • Windows (OS) database for program info • Where is it? • C:Windows (System.dat, User.dat) • Usually accessed via tool (regedit.exe) • Worth protecting? • Yes for some branches (HKLMSOFTWARE MicrosoftOffice Server14.0...) • Protection • Regedit.exe export, documentation
  • 22. Bits and bytes • What are they? • The (often-forgotten) files and installers you need to rebuild a SharePoint environment • SharePoint setup files, OWAs, SPs, CUs, iFilter packs, SQL client install, etc. • Worth protecting? • If your strategy involves rebuilding a SharePoint farm, it’s well worth the time • Protection • External media/disks, replicated storage
  • 23. Edge cases & esoteric targets • .NET Framework config folders • Remote BLOB storage (RBS) • SQL Server transparent data encryption (TDE) • External data sources • Single server farm
  • 24. .NET Framework config folders • What are they? • System-wide configuration files and defaults in the.NET Framework installation folders • Where are they? • C:WindowsMicrosoft.NETFrameworkv…Config • C:WindowsMicrosoft.NETFramework64v…Config • Worth protecting? • Yes if you’ve altered machine.config or similar files • Protection • File system backup, documentation
  • 25. Remote BLOB storage • What is it? • Alternate location where BLOBs are stored when RBS is in-use5 • Where is it? • Varies and depends on RBS provider • Worth protecting? • Absolutely critical if you use RBS • Protection • Varies; consult RBS provider guidance
  • 26. SQL Server TDE • What is it? • TDE = Transparent Data Encryption6 • Real-time encryption/decryption of SQL Server data and log files • Where is it? • SQL Server (master DB or EKM module) • Worth protecting? • Certificate + key protection is critical for TDE • Protection • Export followed by file backup is common
  • 27. External data sources • What is it? • Data that is consumed by SharePoint but resident elsewhere • Where is it? • Examples include BCS external data sources and SQL Server Reporting Services databases • Worth protecting? • Highly variable • Protection • Varies by data source and platform
  • 28. Single server farm • If you have an all-in-one farm and want to maximize usage of the built-in platform tools • Use built-in Windows Server Backup (2008, 2008 R2) • Register the SharePoint VSS Writer • stsadm.exe –o registerwsswriter • Protects entire server, including consistent SP backups 7 • Bare metal restore capability
  • 29. Wrap-up • Your targets are unique to your farm • Understand how your SharePoint environment is used • Use cases are a good starting point for technical targets • There’s more than one protection strategy • Realistically, not everything has to be backed-up • Documentation can be a viable choice in some cases • Protect your (content) databases! • Most important targets in your farm • Critical protection takes minutes. Just invest a little time8
  • 30. References 1. “Document farm configuration settings (SharePoint Server 2010)” • http://tinyurl.com/SPDRFarmDoc2010 2. “Overview of SharePoint Foundation and the Volume Shadow Copy Service” • http://msdn.microsoft.com/en-us/library/cc264314.aspx 3. “Back up and restore customizations (Windows SharePoint Services)” • http://technet.microsoft.com/en-us/library/ee216349(office.12).aspx 4. “Configuration-Only Backup and Restore in SharePoint 2010” • http://sharepointinterface.com/2010/09/10/configuration-only-backup-and- restore-in-sharepoint-2010/ 5. “Overview of Remote BLOB Storage (SharePoint Foundation 2010)” • http://technet.microsoft.com/en-us/library/ee748607.aspx
  • 31. References 6. “Understanding Transparent Data Encryption (TDE)” • http://msdn.microsoft.com/en-us/library/bb934049.aspx 7. “Plan for backup and recovery (SharePoint Server 2010)” • http://technet.microsoft.com/en-us/library/cc261687.aspx 8. “Scheduling SQL backups for SharePoint” • http://www.toddklindt.com/blog/Lists/Posts/Post.aspx?ID=248
  • 32. Finding me Sean P. McDonough Blog: http://SharePointInterface.com Email: sean@SharePointInterface.com LinkedIn: http://www.linkedin.com/in/smcdonough Twitter: @spmcdonough The SharePoint 2007 Disaster Recovery Guide http://tinyurl.com/SPDRGuide2007 The SharePoint 2010 Disaster Recovery Guide http://tinyurl.com/SPDRGuide2010