SlideShare uma empresa Scribd logo
1 de 23
Baixar para ler offline
APPASSURE REPLICATION
TECHNICAL OVERVIEW
Table of Contents
 What is AppAssure?

 AppAssure Product Architecture

 AppAssure Replication

 How it Works
  • Terms
  • Snapshots
  • Implementation Details
  • Replication Topologies          What AppAssure
  • Replication Schedules          Customers Say
What is AppAssure?
 AppAssure Backup and Replication is the world’s fastest
 and easiest backup and disaster recovery software for
 Windows application servers and desktops.

 The only complete “all-in-one” backup and disaster recovery
 software solution, AppAssure enables local recoveries from
 any type of failure in just minutes, with the added assurance of
 offsite application and data backup and recovery from a total
 site disaster.
AppAssure Product Architecture
AppAssure can be deployed as a single-server or a multi-server architecture.
Single-server architecture consists of AppAssure Server and Agent running on
the same server typically seen in small environments where as a multi- server
architecture consists of a dedicated AppAssure Server protecting one or multiple
Agents running different application workloads.
AppAssure Replication
This presentation describes the Replication feature of AppAssure. Replication
is designed to replicate recovery points between AppAssure Cores in an efficient
and safe manner to enable off-site backup and off-site disaster recovery.

AppAssure Replication option can be
enabled or disabled on a per protected
server basis. This option is available in
single server and multi-server
implementations.

The cool thing about AppAssure
Replication is that it replicates the
compressed and de-duplicated recovery
points over the WAN so its bandwidth
efficiently saves storage on the LAN and
at the DR location.                               Figure 1 – Off-Site Disaster Recovery
How It Works
The following slides describe how AppAssure Replication
works by:
 defining our terminology

 reviewing our approach
Terms
                   A Windows workload, physical or virtual,
Protected Server   that is protected by a AppAssure Agent.
                   Supported environments include
                   Windows® Server 2008 R2, Windows®
                   2008 Server, Windows® 2003 Server,
                   Windows 7, Windows Vista, Windows XP
                   (SP3).
Terms
                 Processes and stores compressed and
AppAssure Core   deduplicated recovery points as incremental
                 forever images of the protected servers. Cores
                 can be installed on the protected server or on a
                 dedicated server or worker virtual machine. This
                 role performs many functions including creating
                 virtual standby environments, application
                 validation, restores & replication.
                                          recovery
                                            point


                                                      recovery
                                                        point
                             AppAssure
                               Core
                                                      recovery
                                                        point



                                           recovery
                                             point
Terms
                  Represents a point-in-time image of the protected
Recovery Points   server. They are stored as compressed and
                  deduplicated files on storage available to the
                  AppAssure Core, DAS, NAS, SAN.


                  The server from where the replication of the
Replication       recovery points is initiated. Replication is always
                  performed between two AppAssure Cores.
Source
Terms
    Replication Target


  The server that is the destination
  of the replicated recovery points.
Snapshots
AppAssure creates point-in-time snapshots of the protected servers and they
are stored as compressed and deduplicated recovery points in a directory
accessible from the AppAssure Core.

The recovery points are maintained on a per protected server basis in a
directory structure as follows:
Drive:TevoRepositoryProtectedServerName1
recoverypoint4Incremental
recoverypoint3Incremental
recoverypoint2Incremental
recoverypoint1Base                                                AppAssure
                                                                    Core
ShareNameTevoRepositoryProtectedServerName2
recoverypoint4Incremental
recoverypoint3Incremental
recoverypoint2Incremental
recoverypoint1Base
Replication
                         Replication copies the recovery points from a
                         replication source to replication target on a per
                         protected server basis.

                         As recovery points are replicated, all recovery point
                         files and registry settings are replicated to the
                         secondary AppAssure Core, such that the loss of the
                         replication source won’t mean the loss of all recovery
                         points and protection settings.


In the case of a AppAssure Core outage, the AppAssure Core can be rebuilt,
and resynchronized with a mirror, though until resync is complete the primary
AppAssure Core won’t be able to accept new snapshots.
AppAssure Replication Facts
 New snapshots taken on the replication source will be replicated to replication
  target.
 Replication is performed on a per protected server basis.
 Recovery points are replicated oldest-first, to ensure the replication target always
  has a valid and mountable epoch chain.
 Recovery point changes due to rollup will not be replicated reducing the amount of
  data that needs to be transferred or the WAN. The replication target will perform its
  own rollup on the replicated recovery points.
 Rollup and replication will not conflict with one another.

 It is assumed that the replication target is on a
  different subnet and behind a different firewall than
  replication source, thus the replication target will
  only communicate with the agents protected by
  replication source for rollback purposes.
AppAssure Replication Facts
 The replication target is able to perform all normal
  AppAssure restore functions such as BMR, instant
  rollback, VM export, even if the replication source is down.
 If Exchange is being protected, Exchange and system
  DLLs from the replication source will be propagated to the
  replication target so features such as force mountability
  check, MR, and P2V are available on the replication target.
 Mismatched versions between replication source and replication target are detected.
 The replication source and replication target can be any combination of supported
  operating systems.
 In the event of a link failure or transfer error, when the link comes back up, the
  transfer is resumed from where it was interrupted.
 All recovery points that are replicated are verified for integrity.
Replication Implementation Details
 Internally, the AppAssure Cores communicate over HTTP.
  The target listens on port 8080 for HTTP connections from
  the source. All communications are initiated by the source
  to the target.
 AppAssure uses the adler-32 checksum algorithm to verify
  the integrity of transferred files, and detect when a
  partially-transferred file can be resumed without data loss.
 To determine what files to replicate, AppAssure chooses all source files not yet
  on the target, and those files on both which have not yet been rolled up but have
  different metadata between the two sides.
 Each file is transferred in a separate HTTP PUT operation. Once an entire epoch
  is transferred, it is loaded into AppAssure and available for use. Thus, some
  replicated recovery points are available for use even before all recovery points
  have replicated.
Replication Topologies
AppAssure supports various replication
topologies to meet your business needs.


1 : 1 Configuration


The 1 : 1 configuration is that standard
configuration and is useful for protection
of a single server or group of servers
from one site to another.
Replication Topologies

Many : 1
Configuration
Replication Topologies

Many : Many
Configuration
AppAssure Replication
supports replication on a
per protected server
basis. This means that
you can replicate
different protected
server’s recovery points
to different replication
targets in different
locations as shown in the
figure.
Replication Schedules
AppAssure Replication can be scheduled to run during certain times during
the day. Any time outside of this window, replication will be suspended. The
schedule is specified as a start and stop time for weekdays, and a start and
stop time for weekends.

 Users can, on an ad-hoc basis,
  pause a currently running replication
  for an hour, a day, or until resumed.
 Users can configure VM export,
  recovery point export, or continuous
  rollback on the replication target for
  recovery points replicated from the
  replication source.
Replication Schedules
Recovery Point Copy and Consume
The copying feature is useful when
the WAN link is insufficient to move
large amounts of data. It copies the
existing recovery points including
the base image from the replication
source to a local removable device.
Once the copy is complete, the
removable drive can be inserted in
the replication target and
consumed. The replication target is
seeded with the recovery points
from the replication source including
the base image. The replication will
resume by replicating the new
recovery points only.
Replication Schedules
Authentication between AppAssure Cores

AppAssure uses NTLM authentication over HTTP. Once authenticated between
the replication source and the replication target, AppAssure generates a one-
time-use key, which it exchanges via RSA over HTTP.

Each request sent to the replication target over
HTTP is authenticated with a separate one-time
key.
Thus, authentication is hardened against
AppAssure attacks, but potentially
vulnerable to a man-in-the-middle attack
since we have no way of authenticating the
identity of the remote server.
What AppAssure Customers Say
Brendan Hourihan – Technology Services Network Engineer, Flagler College:
                  “With AppAssure, I thought I entered into a dreamland! Finally I’m
                  talking with somebody who has a philosophy about backups that
                  makes sense – a more logical approach to how data is backed up
                  AND what you can do with the backed-up data: you can replicate it,
                  synchronize it, and more!”

        Peter Hammerl – IT Administrator, Hamilton Port Authority:
                  AppAssure is working great. I’ve tested restoring files and databases,
                  and everything has gone smoothly. The application is pretty granular
                  so we can choose what to backup, at what time intervals, etc. We
                  can get exactly what we want when we want it.”

                Eric Sagerdahl – IT Analyst, Walden House:
                  “We’ve always been happy with the support … if you really need to
                  talk to somebody right away, there’s always someone right there for
                  you... I honestly don’t know how we would have recovered all the
                  data before AppAssure.”
Questions
If you have questions about AppAssure Backup & Replication software,
please select an option below to contact us:
     Sales:                sales@appassure.com
     Support:              support@appassure.com
     Phone:                +1 (703) 547-8686
     Web:                  www.appassure.com



Download a FREE trial of AppAssure Backup & Replication at

                 www.appassure.com

Mais conteúdo relacionado

Mais procurados

Disaster Recovery to the Cloud with Microsoft Azure
Disaster Recovery to the Cloud with Microsoft AzureDisaster Recovery to the Cloud with Microsoft Azure
Disaster Recovery to the Cloud with Microsoft AzureLai Yoong Seng
 
Building the Perfect SharePoint 2010 Farm - SPS Brisbane 2011
Building the Perfect SharePoint 2010 Farm - SPS Brisbane 2011Building the Perfect SharePoint 2010 Farm - SPS Brisbane 2011
Building the Perfect SharePoint 2010 Farm - SPS Brisbane 2011Michael Noel
 
Boosting performance with the Dell Acceleration Appliance for Databases
Boosting performance with the Dell Acceleration Appliance for DatabasesBoosting performance with the Dell Acceleration Appliance for Databases
Boosting performance with the Dell Acceleration Appliance for DatabasesPrincipled Technologies
 
AWS Summit 2011: High Availability Database Architectures in AWS Cloud
AWS Summit 2011: High Availability Database Architectures in AWS CloudAWS Summit 2011: High Availability Database Architectures in AWS Cloud
AWS Summit 2011: High Availability Database Architectures in AWS CloudAmazon Web Services
 
White Paper: MoreVRP for EMC Greenplum
White Paper: MoreVRP for EMC Greenplum  White Paper: MoreVRP for EMC Greenplum
White Paper: MoreVRP for EMC Greenplum EMC
 
AWS EC2 M6i instances with 3rd Gen Intel Xeon Scalable processors accelerated...
AWS EC2 M6i instances with 3rd Gen Intel Xeon Scalable processors accelerated...AWS EC2 M6i instances with 3rd Gen Intel Xeon Scalable processors accelerated...
AWS EC2 M6i instances with 3rd Gen Intel Xeon Scalable processors accelerated...Principled Technologies
 
Avamar Presentatie Q3 2010
Avamar Presentatie Q3 2010Avamar Presentatie Q3 2010
Avamar Presentatie Q3 2010Jo Verstappen
 
Speed up deep learning tasks with Amazon Web Services instances featuring 2nd...
Speed up deep learning tasks with Amazon Web Services instances featuring 2nd...Speed up deep learning tasks with Amazon Web Services instances featuring 2nd...
Speed up deep learning tasks with Amazon Web Services instances featuring 2nd...Principled Technologies
 
DBaaS with VMware vCAC, EMC XtremIO, and Cisco UCS
DBaaS with VMware vCAC, EMC XtremIO, and Cisco UCSDBaaS with VMware vCAC, EMC XtremIO, and Cisco UCS
DBaaS with VMware vCAC, EMC XtremIO, and Cisco UCSPrincipled Technologies
 
googlecluster-ieee
googlecluster-ieeegooglecluster-ieee
googlecluster-ieeeHiroshi Ono
 
STN Event 12.8.09 - Chris Vain Powerpoint Presentation
STN Event 12.8.09 - Chris Vain Powerpoint PresentationSTN Event 12.8.09 - Chris Vain Powerpoint Presentation
STN Event 12.8.09 - Chris Vain Powerpoint Presentationmcini
 
Postgres plus cloud_database_getting_started_guide
Postgres plus cloud_database_getting_started_guidePostgres plus cloud_database_getting_started_guide
Postgres plus cloud_database_getting_started_guideice1oog
 
Sizing Splunk SmartStore - Spend Less and Get More Out of Splunk
Sizing Splunk SmartStore - Spend Less and Get More Out of SplunkSizing Splunk SmartStore - Spend Less and Get More Out of Splunk
Sizing Splunk SmartStore - Spend Less and Get More Out of SplunkPaula Koziol
 
VMware And Avamar Backup
VMware And Avamar BackupVMware And Avamar Backup
VMware And Avamar Backupjpo1974
 
VMworld 2013: VMware Disaster Recovery Solution with Oracle Data Guard and Si...
VMworld 2013: VMware Disaster Recovery Solution with Oracle Data Guard and Si...VMworld 2013: VMware Disaster Recovery Solution with Oracle Data Guard and Si...
VMworld 2013: VMware Disaster Recovery Solution with Oracle Data Guard and Si...VMworld
 
Workload Optimisation
Workload OptimisationWorkload Optimisation
Workload Optimisationianmasters
 

Mais procurados (19)

HADRFINAL13112016
HADRFINAL13112016HADRFINAL13112016
HADRFINAL13112016
 
Disaster Recovery to the Cloud with Microsoft Azure
Disaster Recovery to the Cloud with Microsoft AzureDisaster Recovery to the Cloud with Microsoft Azure
Disaster Recovery to the Cloud with Microsoft Azure
 
Using VMTurbo to boost performance
Using VMTurbo to boost performanceUsing VMTurbo to boost performance
Using VMTurbo to boost performance
 
Building the Perfect SharePoint 2010 Farm - SPS Brisbane 2011
Building the Perfect SharePoint 2010 Farm - SPS Brisbane 2011Building the Perfect SharePoint 2010 Farm - SPS Brisbane 2011
Building the Perfect SharePoint 2010 Farm - SPS Brisbane 2011
 
Boosting performance with the Dell Acceleration Appliance for Databases
Boosting performance with the Dell Acceleration Appliance for DatabasesBoosting performance with the Dell Acceleration Appliance for Databases
Boosting performance with the Dell Acceleration Appliance for Databases
 
AWS Summit 2011: High Availability Database Architectures in AWS Cloud
AWS Summit 2011: High Availability Database Architectures in AWS CloudAWS Summit 2011: High Availability Database Architectures in AWS Cloud
AWS Summit 2011: High Availability Database Architectures in AWS Cloud
 
White Paper: MoreVRP for EMC Greenplum
White Paper: MoreVRP for EMC Greenplum  White Paper: MoreVRP for EMC Greenplum
White Paper: MoreVRP for EMC Greenplum
 
AWS EC2 M6i instances with 3rd Gen Intel Xeon Scalable processors accelerated...
AWS EC2 M6i instances with 3rd Gen Intel Xeon Scalable processors accelerated...AWS EC2 M6i instances with 3rd Gen Intel Xeon Scalable processors accelerated...
AWS EC2 M6i instances with 3rd Gen Intel Xeon Scalable processors accelerated...
 
Avamar Presentatie Q3 2010
Avamar Presentatie Q3 2010Avamar Presentatie Q3 2010
Avamar Presentatie Q3 2010
 
Speed up deep learning tasks with Amazon Web Services instances featuring 2nd...
Speed up deep learning tasks with Amazon Web Services instances featuring 2nd...Speed up deep learning tasks with Amazon Web Services instances featuring 2nd...
Speed up deep learning tasks with Amazon Web Services instances featuring 2nd...
 
DBaaS with VMware vCAC, EMC XtremIO, and Cisco UCS
DBaaS with VMware vCAC, EMC XtremIO, and Cisco UCSDBaaS with VMware vCAC, EMC XtremIO, and Cisco UCS
DBaaS with VMware vCAC, EMC XtremIO, and Cisco UCS
 
googlecluster-ieee
googlecluster-ieeegooglecluster-ieee
googlecluster-ieee
 
STN Event 12.8.09 - Chris Vain Powerpoint Presentation
STN Event 12.8.09 - Chris Vain Powerpoint PresentationSTN Event 12.8.09 - Chris Vain Powerpoint Presentation
STN Event 12.8.09 - Chris Vain Powerpoint Presentation
 
Postgres plus cloud_database_getting_started_guide
Postgres plus cloud_database_getting_started_guidePostgres plus cloud_database_getting_started_guide
Postgres plus cloud_database_getting_started_guide
 
Sizing Splunk SmartStore - Spend Less and Get More Out of Splunk
Sizing Splunk SmartStore - Spend Less and Get More Out of SplunkSizing Splunk SmartStore - Spend Less and Get More Out of Splunk
Sizing Splunk SmartStore - Spend Less and Get More Out of Splunk
 
Storage craft shadowprotect_server
Storage craft shadowprotect_serverStorage craft shadowprotect_server
Storage craft shadowprotect_server
 
VMware And Avamar Backup
VMware And Avamar BackupVMware And Avamar Backup
VMware And Avamar Backup
 
VMworld 2013: VMware Disaster Recovery Solution with Oracle Data Guard and Si...
VMworld 2013: VMware Disaster Recovery Solution with Oracle Data Guard and Si...VMworld 2013: VMware Disaster Recovery Solution with Oracle Data Guard and Si...
VMworld 2013: VMware Disaster Recovery Solution with Oracle Data Guard and Si...
 
Workload Optimisation
Workload OptimisationWorkload Optimisation
Workload Optimisation
 

Semelhante a App assure replication

Vmware srm 6.1
Vmware srm 6.1Vmware srm 6.1
Vmware srm 6.1faz4eva_27
 
Dell app assure 5 datasheet
Dell app assure 5 datasheetDell app assure 5 datasheet
Dell app assure 5 datasheetSeth David
 
Azure Backup component matrix
Azure Backup component matrixAzure Backup component matrix
Azure Backup component matrixAnthony Clendenen
 
snapshot vs backup
snapshot vs backupsnapshot vs backup
snapshot vs backupssuser1eca7d
 
Wwc disaster solution
Wwc disaster solutionWwc disaster solution
Wwc disaster solutionSeth David
 
OpenStack Tokyo Talk Application Data Protection Service
OpenStack Tokyo Talk Application Data Protection ServiceOpenStack Tokyo Talk Application Data Protection Service
OpenStack Tokyo Talk Application Data Protection ServiceEran Gampel
 
What’s New in VMware vCenter Site Recovery Manager v5.0
What’s New in VMware vCenter Site Recovery Manager v5.0What’s New in VMware vCenter Site Recovery Manager v5.0
What’s New in VMware vCenter Site Recovery Manager v5.0Eric Sloof
 
How can RAID make your server more reliable- How can Hyper-V make back.docx
How can RAID make your server more reliable- How can Hyper-V make back.docxHow can RAID make your server more reliable- How can Hyper-V make back.docx
How can RAID make your server more reliable- How can Hyper-V make back.docxhamblymarta
 
App assure unique_features
App assure unique_featuresApp assure unique_features
App assure unique_featuresgeorgegaudi
 
VMworld 2013: VMware vSphere Replication: Technical Walk-Through with Enginee...
VMworld 2013: VMware vSphere Replication: Technical Walk-Through with Enginee...VMworld 2013: VMware vSphere Replication: Technical Walk-Through with Enginee...
VMworld 2013: VMware vSphere Replication: Technical Walk-Through with Enginee...VMworld
 
DR-to-the-Cloud Best Practices
DR-to-the-Cloud Best PracticesDR-to-the-Cloud Best Practices
DR-to-the-Cloud Best PracticesRackspace
 
Enable Symantec Backup Exec™ to store and retrieve backup data to Cloud stora...
Enable Symantec Backup Exec™ to store and retrieve backup data to Cloud stora...Enable Symantec Backup Exec™ to store and retrieve backup data to Cloud stora...
Enable Symantec Backup Exec™ to store and retrieve backup data to Cloud stora...TwinStrata
 
VMware Site Recovery Manager (SRM) 6.0 Lab Manual
VMware Site Recovery Manager (SRM) 6.0 Lab ManualVMware Site Recovery Manager (SRM) 6.0 Lab Manual
VMware Site Recovery Manager (SRM) 6.0 Lab ManualSanjeev Kumar
 
Track 2, session 3, business continuity and disaster recovery in the virtuali...
Track 2, session 3, business continuity and disaster recovery in the virtuali...Track 2, session 3, business continuity and disaster recovery in the virtuali...
Track 2, session 3, business continuity and disaster recovery in the virtuali...EMC Forum India
 
Namos openstack-manager
Namos openstack-managerNamos openstack-manager
Namos openstack-managerKanagaraj M
 
Efficient Data Protection – Backup in VMware environments
Efficient Data Protection – Backup in VMware environmentsEfficient Data Protection – Backup in VMware environments
Efficient Data Protection – Backup in VMware environmentsKingfin Enterprises Limited
 
VMUG - Falconstor Presentation
VMUG - Falconstor PresentationVMUG - Falconstor Presentation
VMUG - Falconstor Presentation1CloudRoad.com
 

Semelhante a App assure replication (20)

Vmware srm 6.1
Vmware srm 6.1Vmware srm 6.1
Vmware srm 6.1
 
Dell app assure 5 datasheet
Dell app assure 5 datasheetDell app assure 5 datasheet
Dell app assure 5 datasheet
 
Azure Backup component matrix
Azure Backup component matrixAzure Backup component matrix
Azure Backup component matrix
 
snapshot vs backup
snapshot vs backupsnapshot vs backup
snapshot vs backup
 
Wwc disaster solution
Wwc disaster solutionWwc disaster solution
Wwc disaster solution
 
OpenStack Tokyo Talk Application Data Protection Service
OpenStack Tokyo Talk Application Data Protection ServiceOpenStack Tokyo Talk Application Data Protection Service
OpenStack Tokyo Talk Application Data Protection Service
 
What’s New in VMware vCenter Site Recovery Manager v5.0
What’s New in VMware vCenter Site Recovery Manager v5.0What’s New in VMware vCenter Site Recovery Manager v5.0
What’s New in VMware vCenter Site Recovery Manager v5.0
 
How can RAID make your server more reliable- How can Hyper-V make back.docx
How can RAID make your server more reliable- How can Hyper-V make back.docxHow can RAID make your server more reliable- How can Hyper-V make back.docx
How can RAID make your server more reliable- How can Hyper-V make back.docx
 
App assure unique_features
App assure unique_featuresApp assure unique_features
App assure unique_features
 
VMworld 2013: VMware vSphere Replication: Technical Walk-Through with Enginee...
VMworld 2013: VMware vSphere Replication: Technical Walk-Through with Enginee...VMworld 2013: VMware vSphere Replication: Technical Walk-Through with Enginee...
VMworld 2013: VMware vSphere Replication: Technical Walk-Through with Enginee...
 
DR-to-the-Cloud Best Practices
DR-to-the-Cloud Best PracticesDR-to-the-Cloud Best Practices
DR-to-the-Cloud Best Practices
 
Enable Symantec Backup Exec™ to store and retrieve backup data to Cloud stora...
Enable Symantec Backup Exec™ to store and retrieve backup data to Cloud stora...Enable Symantec Backup Exec™ to store and retrieve backup data to Cloud stora...
Enable Symantec Backup Exec™ to store and retrieve backup data to Cloud stora...
 
VMware Site Recovery Manager 6
VMware Site Recovery Manager 6VMware Site Recovery Manager 6
VMware Site Recovery Manager 6
 
VMware Site Recovery Manager (SRM) 6.0 Lab Manual
VMware Site Recovery Manager (SRM) 6.0 Lab ManualVMware Site Recovery Manager (SRM) 6.0 Lab Manual
VMware Site Recovery Manager (SRM) 6.0 Lab Manual
 
Track 2, session 3, business continuity and disaster recovery in the virtuali...
Track 2, session 3, business continuity and disaster recovery in the virtuali...Track 2, session 3, business continuity and disaster recovery in the virtuali...
Track 2, session 3, business continuity and disaster recovery in the virtuali...
 
Namos openstack-manager
Namos openstack-managerNamos openstack-manager
Namos openstack-manager
 
Redis vs Aerospike
Redis vs AerospikeRedis vs Aerospike
Redis vs Aerospike
 
Efficient Data Protection – Backup in VMware environments
Efficient Data Protection – Backup in VMware environmentsEfficient Data Protection – Backup in VMware environments
Efficient Data Protection – Backup in VMware environments
 
Technical track 1: arcserve UDP deep dvie
Technical track 1: arcserve UDP deep dvieTechnical track 1: arcserve UDP deep dvie
Technical track 1: arcserve UDP deep dvie
 
VMUG - Falconstor Presentation
VMUG - Falconstor PresentationVMUG - Falconstor Presentation
VMUG - Falconstor Presentation
 

Último

Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 

Último (20)

Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 

App assure replication

  • 2. Table of Contents  What is AppAssure?  AppAssure Product Architecture  AppAssure Replication  How it Works • Terms • Snapshots • Implementation Details • Replication Topologies  What AppAssure • Replication Schedules Customers Say
  • 3. What is AppAssure? AppAssure Backup and Replication is the world’s fastest and easiest backup and disaster recovery software for Windows application servers and desktops. The only complete “all-in-one” backup and disaster recovery software solution, AppAssure enables local recoveries from any type of failure in just minutes, with the added assurance of offsite application and data backup and recovery from a total site disaster.
  • 4. AppAssure Product Architecture AppAssure can be deployed as a single-server or a multi-server architecture. Single-server architecture consists of AppAssure Server and Agent running on the same server typically seen in small environments where as a multi- server architecture consists of a dedicated AppAssure Server protecting one or multiple Agents running different application workloads.
  • 5. AppAssure Replication This presentation describes the Replication feature of AppAssure. Replication is designed to replicate recovery points between AppAssure Cores in an efficient and safe manner to enable off-site backup and off-site disaster recovery. AppAssure Replication option can be enabled or disabled on a per protected server basis. This option is available in single server and multi-server implementations. The cool thing about AppAssure Replication is that it replicates the compressed and de-duplicated recovery points over the WAN so its bandwidth efficiently saves storage on the LAN and at the DR location. Figure 1 – Off-Site Disaster Recovery
  • 6. How It Works The following slides describe how AppAssure Replication works by:  defining our terminology  reviewing our approach
  • 7. Terms A Windows workload, physical or virtual, Protected Server that is protected by a AppAssure Agent. Supported environments include Windows® Server 2008 R2, Windows® 2008 Server, Windows® 2003 Server, Windows 7, Windows Vista, Windows XP (SP3).
  • 8. Terms Processes and stores compressed and AppAssure Core deduplicated recovery points as incremental forever images of the protected servers. Cores can be installed on the protected server or on a dedicated server or worker virtual machine. This role performs many functions including creating virtual standby environments, application validation, restores & replication. recovery point recovery point AppAssure Core recovery point recovery point
  • 9. Terms Represents a point-in-time image of the protected Recovery Points server. They are stored as compressed and deduplicated files on storage available to the AppAssure Core, DAS, NAS, SAN. The server from where the replication of the Replication recovery points is initiated. Replication is always performed between two AppAssure Cores. Source
  • 10. Terms Replication Target The server that is the destination of the replicated recovery points.
  • 11. Snapshots AppAssure creates point-in-time snapshots of the protected servers and they are stored as compressed and deduplicated recovery points in a directory accessible from the AppAssure Core. The recovery points are maintained on a per protected server basis in a directory structure as follows: Drive:TevoRepositoryProtectedServerName1 recoverypoint4Incremental recoverypoint3Incremental recoverypoint2Incremental recoverypoint1Base AppAssure Core ShareNameTevoRepositoryProtectedServerName2 recoverypoint4Incremental recoverypoint3Incremental recoverypoint2Incremental recoverypoint1Base
  • 12. Replication Replication copies the recovery points from a replication source to replication target on a per protected server basis. As recovery points are replicated, all recovery point files and registry settings are replicated to the secondary AppAssure Core, such that the loss of the replication source won’t mean the loss of all recovery points and protection settings. In the case of a AppAssure Core outage, the AppAssure Core can be rebuilt, and resynchronized with a mirror, though until resync is complete the primary AppAssure Core won’t be able to accept new snapshots.
  • 13. AppAssure Replication Facts  New snapshots taken on the replication source will be replicated to replication target.  Replication is performed on a per protected server basis.  Recovery points are replicated oldest-first, to ensure the replication target always has a valid and mountable epoch chain.  Recovery point changes due to rollup will not be replicated reducing the amount of data that needs to be transferred or the WAN. The replication target will perform its own rollup on the replicated recovery points.  Rollup and replication will not conflict with one another.  It is assumed that the replication target is on a different subnet and behind a different firewall than replication source, thus the replication target will only communicate with the agents protected by replication source for rollback purposes.
  • 14. AppAssure Replication Facts  The replication target is able to perform all normal AppAssure restore functions such as BMR, instant rollback, VM export, even if the replication source is down.  If Exchange is being protected, Exchange and system DLLs from the replication source will be propagated to the replication target so features such as force mountability check, MR, and P2V are available on the replication target.  Mismatched versions between replication source and replication target are detected.  The replication source and replication target can be any combination of supported operating systems.  In the event of a link failure or transfer error, when the link comes back up, the transfer is resumed from where it was interrupted.  All recovery points that are replicated are verified for integrity.
  • 15. Replication Implementation Details  Internally, the AppAssure Cores communicate over HTTP. The target listens on port 8080 for HTTP connections from the source. All communications are initiated by the source to the target.  AppAssure uses the adler-32 checksum algorithm to verify the integrity of transferred files, and detect when a partially-transferred file can be resumed without data loss.  To determine what files to replicate, AppAssure chooses all source files not yet on the target, and those files on both which have not yet been rolled up but have different metadata between the two sides.  Each file is transferred in a separate HTTP PUT operation. Once an entire epoch is transferred, it is loaded into AppAssure and available for use. Thus, some replicated recovery points are available for use even before all recovery points have replicated.
  • 16. Replication Topologies AppAssure supports various replication topologies to meet your business needs. 1 : 1 Configuration The 1 : 1 configuration is that standard configuration and is useful for protection of a single server or group of servers from one site to another.
  • 17. Replication Topologies Many : 1 Configuration
  • 18. Replication Topologies Many : Many Configuration AppAssure Replication supports replication on a per protected server basis. This means that you can replicate different protected server’s recovery points to different replication targets in different locations as shown in the figure.
  • 19. Replication Schedules AppAssure Replication can be scheduled to run during certain times during the day. Any time outside of this window, replication will be suspended. The schedule is specified as a start and stop time for weekdays, and a start and stop time for weekends.  Users can, on an ad-hoc basis, pause a currently running replication for an hour, a day, or until resumed.  Users can configure VM export, recovery point export, or continuous rollback on the replication target for recovery points replicated from the replication source.
  • 20. Replication Schedules Recovery Point Copy and Consume The copying feature is useful when the WAN link is insufficient to move large amounts of data. It copies the existing recovery points including the base image from the replication source to a local removable device. Once the copy is complete, the removable drive can be inserted in the replication target and consumed. The replication target is seeded with the recovery points from the replication source including the base image. The replication will resume by replicating the new recovery points only.
  • 21. Replication Schedules Authentication between AppAssure Cores AppAssure uses NTLM authentication over HTTP. Once authenticated between the replication source and the replication target, AppAssure generates a one- time-use key, which it exchanges via RSA over HTTP. Each request sent to the replication target over HTTP is authenticated with a separate one-time key. Thus, authentication is hardened against AppAssure attacks, but potentially vulnerable to a man-in-the-middle attack since we have no way of authenticating the identity of the remote server.
  • 22. What AppAssure Customers Say Brendan Hourihan – Technology Services Network Engineer, Flagler College: “With AppAssure, I thought I entered into a dreamland! Finally I’m talking with somebody who has a philosophy about backups that makes sense – a more logical approach to how data is backed up AND what you can do with the backed-up data: you can replicate it, synchronize it, and more!” Peter Hammerl – IT Administrator, Hamilton Port Authority: AppAssure is working great. I’ve tested restoring files and databases, and everything has gone smoothly. The application is pretty granular so we can choose what to backup, at what time intervals, etc. We can get exactly what we want when we want it.” Eric Sagerdahl – IT Analyst, Walden House: “We’ve always been happy with the support … if you really need to talk to somebody right away, there’s always someone right there for you... I honestly don’t know how we would have recovered all the data before AppAssure.”
  • 23. Questions If you have questions about AppAssure Backup & Replication software, please select an option below to contact us:  Sales: sales@appassure.com  Support: support@appassure.com  Phone: +1 (703) 547-8686  Web: www.appassure.com Download a FREE trial of AppAssure Backup & Replication at www.appassure.com