SlideShare uma empresa Scribd logo
1 de 6
Baixar para ler offline
* DRAFT *
Implementing Seamless Disk-based
Data Protection and Recovery
By Michael S. Mendola,
Sr. Storage Architect
A Mendola White Paper
Contents
Introduction 2
Is Disk-based Data Protection New? 2
To Do-it-Yourself or Not 3
The Key to Choosing and Planning
for Disk-based Data Protection and
Recovery 3
Implementation 5
Summary 5
Introduction
Have you already considered migrating to a
disk-based backup and recovery method?
Are you already somewhere along this path,
or haven’t yet decided that this is even right
for you? In any case, you are about to learn
the most efficient and cost-effective way of
planning for and bringing disk-based backup
and recovery into your IT environment.
Data protection and recovery have been a
major IT challenge for many years. It has
been said by experts that backup may
account for more than 50% of IT systems
administration time. Further, backing up
data to tape takes so much time and attention
that the capability to actually be able to
restore from backup data usually goes
untested - until that data is needed.
Many large IT shops are considering or
already enhancing their backup strategy with
new disk-based options. By moving to the
capabilities of disk, enterprises can
complement their tape backup strategies to
achieve faster and more reliable backup and
much faster – and more relevant – data
recovery while continuing to use tape for
offsite storage and longer-term archiving.
Is Disk-based Data Protection New?
By now many, if not most administrators of
IT systems in smaller businesses have at
least had the passing thought of
implementing a disk-based data protection
solution. Although the concept is certainly
not new, many quickly find that the myriad
of choices in solutions, methodologies and
vendors (and vendor claims) make the
“goodness” of disk-based backup and
recovery quickly regress into a solution that
is more expensive and at least as unwieldy
to manage as their old tape-based system
was. This is mainly due to realizing too late
that there are many considerations to be
taken into account when moving
toward using disk technologies to
protect and recover business-critical
data and systems, especially if there
are one or more remote business
locations which must be considered.
To Do-it-Yourself or Not
The concept of using disk instead of
tape as a “backup target” is fairly
straightforward, and this can be done
while still keeping the legacy tape-
based system intact. Many smaller
shops even start out by just daily
copying their files to one or more
USB drives and then taking the
drives offsite. Others have started to
use online WAN-based service
providers which allow automatic
periodic file backup over the Internet
to a remote vaulting location where
data is protected and restorable at the
file or even disk-image level when
needed. Again, for very, very small
businesses these options may be just
the thing. However, should the
business start to grow, or where there
might come into play external
demands, such as compliance,
varying mandated retention policies,
etc., these methods will quickly
become a major liability which itself
will start to beg for a solution; The
act of changing what has already
been put into place will be much
more costly in time, money,
materials – and disruption - than first
employing, through proper planning
and implementation the best solution
which fits current needs and can then
be made to granularly and
seamlessly scale to accommodate
growing needs or even just shear
changes in requirements.
The Key to Choosing and Planning
for Disk-based Data Protection and
Recovery
For the small-to-medium-sized organization,
the debate on whether disk-based data
protection should be used is pretty-much
over because the benefits far outweigh tape
as the method of production data protection
and recovery. As we have seen, the major
“downside” is to not truly understand how to
go about constructing the vision for, and
then finding the products and services and
vendors to bring disk-based techniques to
life in the most cost-effective and efficient
way, with emphasis on long-term efficacy.
An added benefit of proper planning and
implementation using the right products and
services is that cost reduction and
technology obsolescence avoidance (“future
proofing”) can be had wherever any storage
is used throughout your IT environment –
even if there are one or more remote sites to
consider.
The best way to view all data storage is in a
five-tier hierarchy which provides a more
holistic point-of-view. Below is a diagram
which does just that:
The diagram uses five layers to
describe storage and its use. Let’s
briefly examine each layer.
Application Tier
All business computers live here.
What each does is immaterial. From
powerful database servers down to
web servers, to back room file
servers, they all have one major
thing in common: They all write,
read and store data on disk.
Production Tier
This is where all of the primary
storage “lives”. Whether internal,
external direct-attached, SAN-based
or NAS, this is where all of the data
is stored - lifeblood business data,
email, down to the golf outing
JPEG’s and music MP3’s, this is
where it all is – and this is what you
need to backup and hopefully are
able to restore if any of it becomes
unavailable (okay, maybe the
JPEG’s and MP#’s are not that
important).
Recovery Tier
This is the layer where you have
systems which hold copies of the
data on in the Production Tier.
Unfortunately many still use tape
here – this is what you are planning
to replace with a disk-based model.
If you had to restore your most
critical business application data,
there are two main question this
layer must allow you to efficiently
address:
- Recovery Time Objective
(RTO): How long will it take
to get the data restored AND get the
application server up and servicing
requests again? (Using snapshot
technology will recover the data in a
very short time, but unless the disk
snapshot system uses integrated file
system and application preparation
agents, database systems will
perform a data consistency check
which will ADD possibly hours to
finally getting the application server
up and running the business again.
- Recovery Point Objective (RPO):
How “stale” is the data that will be
used to restore from? (note that with
tape the answer is easy: it’s as
“fresh” as the last backup, typically
at least 24 hours old).
POINT: The disk systems in this layer are
key as they must protect, reliably hold and
recover your data to whatever “flavor” of
primary storage failed: internal (data and OS
system boot recovery), DAS, SAN and
NAS). Also, if protecting your data means
moving it offsite to another facility (or
protecting data at remote sites means
sending it back to the main site), replication
would fit here as well. The systems in this
layer should enable open choice for what
storage, storage protocols and network
infrastructure to use - and should best be
vendor neutral. It should allow the use of
the most inexpensive disk possible, even if it
might be recycling decommissioned disk
form the Production Tier. Further, it should
be able make the most efficient use of
network bandwidth if replication will be in
the mix.
Protection Tier
This is the place for tape image (both
physical and virtual) data storage, including
disk-based clones if desired.
POINT: ALL first line production
data protection and recovery (with
optimum RTO and RPO “dialed-in”
for each business system) is done
from the Recovery Tier, leaving the
Protection Tier to hold only the
“backups-of-the-backups”.
Archive Tier
It is here where the oldest data which
is still worthy of retaining lives.
Disk storage systems used here
should be of the most cost-effective
and permanent nature (i.e. slowest
access performance, optical, Content
Addressable Storage (CAS),. Data
deduplication systems would fall into
this category as well.
Implementation
As can be seen, stratifying storage
and storage protection and recovery
concepts makes plain the inherent
need for a solid vision and proper
planning and hardware and software
and services vendor selection(s).
There are many vendors, including
your incumbent server and storage
vendor(s), which have their own
disk-based protection and recovery
strategies. These by necessity are
engineered to work best (and
sometimes only with) their main
server and/or storage products suite
and, by nature this will force the
technology/methodology
combination onto the user, resulting
in being more-or-less “locked-in” to
that paradigm.
Just as important to realize is that it
may take multiple vendors to
implement customized solutions at
each layer in the model for your
local and remote organization(s).
Much more rewarding is to select a single
vendor whose sole business is satisfying
each layer in the model with hardware and
software which are specifically designed and
totally integrated as a unit to supply the
features seamlessly. The best scenario is to
have all of the software that drives each
storage system in each layer below the
Application Layer based on a single code
set.
Summary
Disk-based methodologies can simplify,
make more efficient, and most importantly,
much more reliable, the protection and
recovery of your business data. It enables
you to turn from maintaining your data
backup and restore as separate and labor-
intensive operations with often questionable
value toward merging these into a reliable,
rapid and seamless operational environment
which becomes part of your daily production
storage operations. It can also enable
customizable recovery time and recovery
point objectives for each business
application system, giving the ability to
“dial-in” the right mix of solution
capabilities, costs and scaling over time.
The best way to achieve all the “goodness”
of disk-based methodologies is two-fold.
First, seek a tightly integrated modular
solution suite from a single vendor. Further,
the product set should provide components
to cover each layer in the tiered model
which are built on a common code platform.
This approach maximizes product
interoperability and reliability and
minimizes operational complexity.
Second, choose a product and services
provider that has experience and expertise in
this area, especially within the context of the
chosen solution set. Demand a proven
record of expertise in design, planning and
implementation of disk-based
methodologies.

Mais conteúdo relacionado

Mais procurados

2010 data protection best practices
2010 data protection best practices2010 data protection best practices
2010 data protection best practicesMario Tabuada Mussio
 
1cloudstar cloud store.v1.1
1cloudstar cloud store.v1.11cloudstar cloud store.v1.1
1cloudstar cloud store.v1.11CloudStar
 
IT Backup & Restoration: Never Worry about a Late Backup Again
IT Backup & Restoration: Never Worry about a Late Backup AgainIT Backup & Restoration: Never Worry about a Late Backup Again
IT Backup & Restoration: Never Worry about a Late Backup AgainHelpSystems
 
WSC Net App storage for windows challenges and solutions
WSC Net App storage for windows challenges and solutionsWSC Net App storage for windows challenges and solutions
WSC Net App storage for windows challenges and solutionsAccenture
 
Insiders Guide- Managing Storage Performance
Insiders Guide- Managing Storage PerformanceInsiders Guide- Managing Storage Performance
Insiders Guide- Managing Storage PerformanceDataCore Software
 
Data Domain Architecture
Data Domain ArchitectureData Domain Architecture
Data Domain Architecturekoesteruk22
 
Symantec Netbackup Appliance Family
Symantec Netbackup Appliance FamilySymantec Netbackup Appliance Family
Symantec Netbackup Appliance FamilySymantec
 
TSS03135-USEN-00_HR
TSS03135-USEN-00_HRTSS03135-USEN-00_HR
TSS03135-USEN-00_HREd Ahl
 
Business Continuity Presentation
Business Continuity PresentationBusiness Continuity Presentation
Business Continuity Presentationperry57123
 
Get the most out of your storage with the Dell EMC Unity XT 880F All-Flash ar...
Get the most out of your storage with the Dell EMC Unity XT 880F All-Flash ar...Get the most out of your storage with the Dell EMC Unity XT 880F All-Flash ar...
Get the most out of your storage with the Dell EMC Unity XT 880F All-Flash ar...Principled Technologies
 
S de2784 footprint-reduction-edge2015-v2
S de2784 footprint-reduction-edge2015-v2S de2784 footprint-reduction-edge2015-v2
S de2784 footprint-reduction-edge2015-v2Tony Pearson
 
A brief introduction to data storage
A brief introduction to data storageA brief introduction to data storage
A brief introduction to data storagePreludedx
 
TECHNICAL BRIEF▶ NetBackup 7.6 Deduplication Technology
TECHNICAL BRIEF▶ NetBackup 7.6 Deduplication TechnologyTECHNICAL BRIEF▶ NetBackup 7.6 Deduplication Technology
TECHNICAL BRIEF▶ NetBackup 7.6 Deduplication TechnologySymantec
 
Why is Virtualization Creating Storage Sprawl? By Storage Switzerland
Why is Virtualization Creating Storage Sprawl? By Storage SwitzerlandWhy is Virtualization Creating Storage Sprawl? By Storage Switzerland
Why is Virtualization Creating Storage Sprawl? By Storage SwitzerlandINFINIDAT
 
Struggling with data management
Struggling with data managementStruggling with data management
Struggling with data managementDavid Walker
 
TECHNICAL WHITE PAPER: NetBackup Appliances WAN Optimization
TECHNICAL WHITE PAPER: NetBackup Appliances WAN OptimizationTECHNICAL WHITE PAPER: NetBackup Appliances WAN Optimization
TECHNICAL WHITE PAPER: NetBackup Appliances WAN OptimizationSymantec
 

Mais procurados (19)

2010 data protection best practices
2010 data protection best practices2010 data protection best practices
2010 data protection best practices
 
IBM PROTECTIER: FROM BACKUP TO RECOVERY
IBM PROTECTIER: FROM BACKUP TO RECOVERYIBM PROTECTIER: FROM BACKUP TO RECOVERY
IBM PROTECTIER: FROM BACKUP TO RECOVERY
 
1cloudstar cloud store.v1.1
1cloudstar cloud store.v1.11cloudstar cloud store.v1.1
1cloudstar cloud store.v1.1
 
IT Backup & Restoration: Never Worry about a Late Backup Again
IT Backup & Restoration: Never Worry about a Late Backup AgainIT Backup & Restoration: Never Worry about a Late Backup Again
IT Backup & Restoration: Never Worry about a Late Backup Again
 
WSC Net App storage for windows challenges and solutions
WSC Net App storage for windows challenges and solutionsWSC Net App storage for windows challenges and solutions
WSC Net App storage for windows challenges and solutions
 
Insiders Guide- Managing Storage Performance
Insiders Guide- Managing Storage PerformanceInsiders Guide- Managing Storage Performance
Insiders Guide- Managing Storage Performance
 
Data Domain Architecture
Data Domain ArchitectureData Domain Architecture
Data Domain Architecture
 
Symantec Netbackup Appliance Family
Symantec Netbackup Appliance FamilySymantec Netbackup Appliance Family
Symantec Netbackup Appliance Family
 
Final Ucat Ppt
Final Ucat PptFinal Ucat Ppt
Final Ucat Ppt
 
TSS03135-USEN-00_HR
TSS03135-USEN-00_HRTSS03135-USEN-00_HR
TSS03135-USEN-00_HR
 
Business Continuity Presentation
Business Continuity PresentationBusiness Continuity Presentation
Business Continuity Presentation
 
Get the most out of your storage with the Dell EMC Unity XT 880F All-Flash ar...
Get the most out of your storage with the Dell EMC Unity XT 880F All-Flash ar...Get the most out of your storage with the Dell EMC Unity XT 880F All-Flash ar...
Get the most out of your storage with the Dell EMC Unity XT 880F All-Flash ar...
 
Bilcare ltd
Bilcare ltdBilcare ltd
Bilcare ltd
 
S de2784 footprint-reduction-edge2015-v2
S de2784 footprint-reduction-edge2015-v2S de2784 footprint-reduction-edge2015-v2
S de2784 footprint-reduction-edge2015-v2
 
A brief introduction to data storage
A brief introduction to data storageA brief introduction to data storage
A brief introduction to data storage
 
TECHNICAL BRIEF▶ NetBackup 7.6 Deduplication Technology
TECHNICAL BRIEF▶ NetBackup 7.6 Deduplication TechnologyTECHNICAL BRIEF▶ NetBackup 7.6 Deduplication Technology
TECHNICAL BRIEF▶ NetBackup 7.6 Deduplication Technology
 
Why is Virtualization Creating Storage Sprawl? By Storage Switzerland
Why is Virtualization Creating Storage Sprawl? By Storage SwitzerlandWhy is Virtualization Creating Storage Sprawl? By Storage Switzerland
Why is Virtualization Creating Storage Sprawl? By Storage Switzerland
 
Struggling with data management
Struggling with data managementStruggling with data management
Struggling with data management
 
TECHNICAL WHITE PAPER: NetBackup Appliances WAN Optimization
TECHNICAL WHITE PAPER: NetBackup Appliances WAN OptimizationTECHNICAL WHITE PAPER: NetBackup Appliances WAN Optimization
TECHNICAL WHITE PAPER: NetBackup Appliances WAN Optimization
 

Destaque

110513 Asz
110513 Asz110513 Asz
110513 AszSNARTT
 
Teacher’s Journal – Session 4 - Inclusive Learning, Individual Learning Style...
Teacher’s Journal – Session 4 - Inclusive Learning, Individual Learning Style...Teacher’s Journal – Session 4 - Inclusive Learning, Individual Learning Style...
Teacher’s Journal – Session 4 - Inclusive Learning, Individual Learning Style...Peter Buckley
 
Bitacora sesion general
Bitacora  sesion generalBitacora  sesion general
Bitacora sesion generalJ Luiis Ckn
 
Ang kalabaw ni juan
Ang kalabaw ni juanAng kalabaw ni juan
Ang kalabaw ni juangreysnet
 
Greater Boston Association of Realtors Monthly Housing Data: October 2016
Greater Boston Association of Realtors Monthly Housing Data: October 2016Greater Boston Association of Realtors Monthly Housing Data: October 2016
Greater Boston Association of Realtors Monthly Housing Data: October 2016Joe Schutt
 
Human Error and Investigations Training - September 28th and 29th 2016 - NIB...
Human Error  and Investigations Training - September 28th and 29th 2016 - NIB...Human Error  and Investigations Training - September 28th and 29th 2016 - NIB...
Human Error and Investigations Training - September 28th and 29th 2016 - NIB...Fiona Gilchrist
 
Emotional Intelligence & Mindfulness: How Much Do They Matter to Leadership?
Emotional Intelligence & Mindfulness: How Much Do They Matter to Leadership?Emotional Intelligence & Mindfulness: How Much Do They Matter to Leadership?
Emotional Intelligence & Mindfulness: How Much Do They Matter to Leadership?mctenzyk
 

Destaque (12)

110513 Asz
110513 Asz110513 Asz
110513 Asz
 
Teacher’s Journal – Session 4 - Inclusive Learning, Individual Learning Style...
Teacher’s Journal – Session 4 - Inclusive Learning, Individual Learning Style...Teacher’s Journal – Session 4 - Inclusive Learning, Individual Learning Style...
Teacher’s Journal – Session 4 - Inclusive Learning, Individual Learning Style...
 
Bitacora sesion general
Bitacora  sesion generalBitacora  sesion general
Bitacora sesion general
 
Portraits-single upload
Portraits-single uploadPortraits-single upload
Portraits-single upload
 
Ang kalabaw ni juan
Ang kalabaw ni juanAng kalabaw ni juan
Ang kalabaw ni juan
 
Portraits 8.2010
Portraits 8.2010Portraits 8.2010
Portraits 8.2010
 
Greater Boston Association of Realtors Monthly Housing Data: October 2016
Greater Boston Association of Realtors Monthly Housing Data: October 2016Greater Boston Association of Realtors Monthly Housing Data: October 2016
Greater Boston Association of Realtors Monthly Housing Data: October 2016
 
gatos!!!
gatos!!!gatos!!!
gatos!!!
 
Human Error and Investigations Training - September 28th and 29th 2016 - NIB...
Human Error  and Investigations Training - September 28th and 29th 2016 - NIB...Human Error  and Investigations Training - September 28th and 29th 2016 - NIB...
Human Error and Investigations Training - September 28th and 29th 2016 - NIB...
 
Kickoff
KickoffKickoff
Kickoff
 
Taller de Programación Distribuida
Taller de Programación DistribuidaTaller de Programación Distribuida
Taller de Programación Distribuida
 
Emotional Intelligence & Mindfulness: How Much Do They Matter to Leadership?
Emotional Intelligence & Mindfulness: How Much Do They Matter to Leadership?Emotional Intelligence & Mindfulness: How Much Do They Matter to Leadership?
Emotional Intelligence & Mindfulness: How Much Do They Matter to Leadership?
 

Semelhante a Generic RLM White Paper

Streamlining Backup: Enhancing Data Protection with Backup Appliances
Streamlining Backup: Enhancing Data Protection with Backup AppliancesStreamlining Backup: Enhancing Data Protection with Backup Appliances
Streamlining Backup: Enhancing Data Protection with Backup AppliancesMaryJWilliams2
 
Tape and cloud strategies for VM backups
Tape and cloud strategies for VM backupsTape and cloud strategies for VM backups
Tape and cloud strategies for VM backupsVeeam Software
 
Tape Storage Future Directions and the Data Explosion
Tape Storage Future Directions and the Data ExplosionTape Storage Future Directions and the Data Explosion
Tape Storage Future Directions and the Data ExplosionIBM India Smarter Computing
 
The buyers' guide to virtual + physical data protection
The buyers' guide to virtual + physical data protectionThe buyers' guide to virtual + physical data protection
The buyers' guide to virtual + physical data protectionKingfin Enterprises Limited
 
8 considerations for evaluating disk based backup solutions
8 considerations for evaluating disk based backup solutions8 considerations for evaluating disk based backup solutions
8 considerations for evaluating disk based backup solutionsServium
 
Shielding Data Assets: Exploring Data Protection and Disaster Recovery Strate...
Shielding Data Assets: Exploring Data Protection and Disaster Recovery Strate...Shielding Data Assets: Exploring Data Protection and Disaster Recovery Strate...
Shielding Data Assets: Exploring Data Protection and Disaster Recovery Strate...MaryJWilliams2
 
Deduplication Solutions Are Not All Created Equal: Why Data Domain?
Deduplication Solutions Are Not All Created Equal: Why Data Domain?Deduplication Solutions Are Not All Created Equal: Why Data Domain?
Deduplication Solutions Are Not All Created Equal: Why Data Domain?EMC
 
03 Data Recovery - Notes
03 Data Recovery - Notes03 Data Recovery - Notes
03 Data Recovery - NotesKranthi
 
Disaster Recovery & Data Backup Strategies
Disaster Recovery & Data Backup StrategiesDisaster Recovery & Data Backup Strategies
Disaster Recovery & Data Backup StrategiesSpiceworks
 
Managing data to improve disaster recovery preparedness » data center knowledge
Managing data to improve disaster recovery preparedness » data center knowledgeManaging data to improve disaster recovery preparedness » data center knowledge
Managing data to improve disaster recovery preparedness » data center knowledgegeekmodeboy
 
Business Continuity Presentation[1]
Business Continuity Presentation[1]Business Continuity Presentation[1]
Business Continuity Presentation[1]jrm1224
 
Asset Management and Workflow
Asset Management and WorkflowAsset Management and Workflow
Asset Management and WorkflowVirtu Institute
 
Performance Tuning
Performance TuningPerformance Tuning
Performance TuningJannet Peetz
 
Storage Cost vs. Performance: Which Problem are You Solving?
Storage Cost vs. Performance: Which Problem are You Solving?Storage Cost vs. Performance: Which Problem are You Solving?
Storage Cost vs. Performance: Which Problem are You Solving?IBM India Smarter Computing
 
Deduplication on Encrypted Big Data in HDFS
Deduplication on Encrypted Big Data in HDFSDeduplication on Encrypted Big Data in HDFS
Deduplication on Encrypted Big Data in HDFSIRJET Journal
 
Enterprise data protection meeting
Enterprise data protection meetingEnterprise data protection meeting
Enterprise data protection meetingcsandit
 
Disaster Recovery vs Data Backup what is the difference
Disaster Recovery vs Data Backup what is the differenceDisaster Recovery vs Data Backup what is the difference
Disaster Recovery vs Data Backup what is the differencejeetendra mandal
 
Choosing A Secondary Storage
Choosing A Secondary StorageChoosing A Secondary Storage
Choosing A Secondary StorageJessica Tanner
 

Semelhante a Generic RLM White Paper (20)

Streamlining Backup: Enhancing Data Protection with Backup Appliances
Streamlining Backup: Enhancing Data Protection with Backup AppliancesStreamlining Backup: Enhancing Data Protection with Backup Appliances
Streamlining Backup: Enhancing Data Protection with Backup Appliances
 
Tape and cloud strategies for VM backups
Tape and cloud strategies for VM backupsTape and cloud strategies for VM backups
Tape and cloud strategies for VM backups
 
Tape Storage Future Directions and the Data Explosion
Tape Storage Future Directions and the Data ExplosionTape Storage Future Directions and the Data Explosion
Tape Storage Future Directions and the Data Explosion
 
The buyers' guide to virtual + physical data protection
The buyers' guide to virtual + physical data protectionThe buyers' guide to virtual + physical data protection
The buyers' guide to virtual + physical data protection
 
8 considerations for evaluating disk based backup solutions
8 considerations for evaluating disk based backup solutions8 considerations for evaluating disk based backup solutions
8 considerations for evaluating disk based backup solutions
 
Shielding Data Assets: Exploring Data Protection and Disaster Recovery Strate...
Shielding Data Assets: Exploring Data Protection and Disaster Recovery Strate...Shielding Data Assets: Exploring Data Protection and Disaster Recovery Strate...
Shielding Data Assets: Exploring Data Protection and Disaster Recovery Strate...
 
Deduplication Solutions Are Not All Created Equal: Why Data Domain?
Deduplication Solutions Are Not All Created Equal: Why Data Domain?Deduplication Solutions Are Not All Created Equal: Why Data Domain?
Deduplication Solutions Are Not All Created Equal: Why Data Domain?
 
03 Data Recovery - Notes
03 Data Recovery - Notes03 Data Recovery - Notes
03 Data Recovery - Notes
 
Disaster Recovery & Data Backup Strategies
Disaster Recovery & Data Backup StrategiesDisaster Recovery & Data Backup Strategies
Disaster Recovery & Data Backup Strategies
 
Managing data to improve disaster recovery preparedness » data center knowledge
Managing data to improve disaster recovery preparedness » data center knowledgeManaging data to improve disaster recovery preparedness » data center knowledge
Managing data to improve disaster recovery preparedness » data center knowledge
 
Business Continuity Presentation[1]
Business Continuity Presentation[1]Business Continuity Presentation[1]
Business Continuity Presentation[1]
 
Asset Management and Workflow
Asset Management and WorkflowAsset Management and Workflow
Asset Management and Workflow
 
Performance Tuning
Performance TuningPerformance Tuning
Performance Tuning
 
Netmagic the-storage-matrix
Netmagic the-storage-matrixNetmagic the-storage-matrix
Netmagic the-storage-matrix
 
The storage matrix netmagic
The storage matrix   netmagicThe storage matrix   netmagic
The storage matrix netmagic
 
Storage Cost vs. Performance: Which Problem are You Solving?
Storage Cost vs. Performance: Which Problem are You Solving?Storage Cost vs. Performance: Which Problem are You Solving?
Storage Cost vs. Performance: Which Problem are You Solving?
 
Deduplication on Encrypted Big Data in HDFS
Deduplication on Encrypted Big Data in HDFSDeduplication on Encrypted Big Data in HDFS
Deduplication on Encrypted Big Data in HDFS
 
Enterprise data protection meeting
Enterprise data protection meetingEnterprise data protection meeting
Enterprise data protection meeting
 
Disaster Recovery vs Data Backup what is the difference
Disaster Recovery vs Data Backup what is the differenceDisaster Recovery vs Data Backup what is the difference
Disaster Recovery vs Data Backup what is the difference
 
Choosing A Secondary Storage
Choosing A Secondary StorageChoosing A Secondary Storage
Choosing A Secondary Storage
 

Generic RLM White Paper

  • 1. * DRAFT * Implementing Seamless Disk-based Data Protection and Recovery By Michael S. Mendola, Sr. Storage Architect A Mendola White Paper
  • 2. Contents Introduction 2 Is Disk-based Data Protection New? 2 To Do-it-Yourself or Not 3 The Key to Choosing and Planning for Disk-based Data Protection and Recovery 3 Implementation 5 Summary 5 Introduction Have you already considered migrating to a disk-based backup and recovery method? Are you already somewhere along this path, or haven’t yet decided that this is even right for you? In any case, you are about to learn the most efficient and cost-effective way of planning for and bringing disk-based backup and recovery into your IT environment. Data protection and recovery have been a major IT challenge for many years. It has been said by experts that backup may account for more than 50% of IT systems administration time. Further, backing up data to tape takes so much time and attention that the capability to actually be able to restore from backup data usually goes untested - until that data is needed. Many large IT shops are considering or already enhancing their backup strategy with new disk-based options. By moving to the capabilities of disk, enterprises can complement their tape backup strategies to achieve faster and more reliable backup and much faster – and more relevant – data recovery while continuing to use tape for offsite storage and longer-term archiving. Is Disk-based Data Protection New? By now many, if not most administrators of IT systems in smaller businesses have at least had the passing thought of implementing a disk-based data protection solution. Although the concept is certainly not new, many quickly find that the myriad of choices in solutions, methodologies and vendors (and vendor claims) make the “goodness” of disk-based backup and recovery quickly regress into a solution that is more expensive and at least as unwieldy to manage as their old tape-based system was. This is mainly due to realizing too late that there are many considerations to be
  • 3. taken into account when moving toward using disk technologies to protect and recover business-critical data and systems, especially if there are one or more remote business locations which must be considered. To Do-it-Yourself or Not The concept of using disk instead of tape as a “backup target” is fairly straightforward, and this can be done while still keeping the legacy tape- based system intact. Many smaller shops even start out by just daily copying their files to one or more USB drives and then taking the drives offsite. Others have started to use online WAN-based service providers which allow automatic periodic file backup over the Internet to a remote vaulting location where data is protected and restorable at the file or even disk-image level when needed. Again, for very, very small businesses these options may be just the thing. However, should the business start to grow, or where there might come into play external demands, such as compliance, varying mandated retention policies, etc., these methods will quickly become a major liability which itself will start to beg for a solution; The act of changing what has already been put into place will be much more costly in time, money, materials – and disruption - than first employing, through proper planning and implementation the best solution which fits current needs and can then be made to granularly and seamlessly scale to accommodate growing needs or even just shear changes in requirements. The Key to Choosing and Planning for Disk-based Data Protection and Recovery For the small-to-medium-sized organization, the debate on whether disk-based data protection should be used is pretty-much over because the benefits far outweigh tape as the method of production data protection and recovery. As we have seen, the major “downside” is to not truly understand how to go about constructing the vision for, and then finding the products and services and vendors to bring disk-based techniques to life in the most cost-effective and efficient way, with emphasis on long-term efficacy. An added benefit of proper planning and implementation using the right products and services is that cost reduction and technology obsolescence avoidance (“future proofing”) can be had wherever any storage is used throughout your IT environment – even if there are one or more remote sites to consider. The best way to view all data storage is in a five-tier hierarchy which provides a more holistic point-of-view. Below is a diagram which does just that:
  • 4. The diagram uses five layers to describe storage and its use. Let’s briefly examine each layer. Application Tier All business computers live here. What each does is immaterial. From powerful database servers down to web servers, to back room file servers, they all have one major thing in common: They all write, read and store data on disk. Production Tier This is where all of the primary storage “lives”. Whether internal, external direct-attached, SAN-based or NAS, this is where all of the data is stored - lifeblood business data, email, down to the golf outing JPEG’s and music MP3’s, this is where it all is – and this is what you need to backup and hopefully are able to restore if any of it becomes unavailable (okay, maybe the JPEG’s and MP#’s are not that important). Recovery Tier This is the layer where you have systems which hold copies of the data on in the Production Tier. Unfortunately many still use tape here – this is what you are planning to replace with a disk-based model. If you had to restore your most critical business application data, there are two main question this layer must allow you to efficiently address: - Recovery Time Objective (RTO): How long will it take to get the data restored AND get the application server up and servicing requests again? (Using snapshot technology will recover the data in a very short time, but unless the disk snapshot system uses integrated file system and application preparation agents, database systems will perform a data consistency check which will ADD possibly hours to finally getting the application server up and running the business again. - Recovery Point Objective (RPO): How “stale” is the data that will be used to restore from? (note that with tape the answer is easy: it’s as “fresh” as the last backup, typically at least 24 hours old). POINT: The disk systems in this layer are key as they must protect, reliably hold and recover your data to whatever “flavor” of primary storage failed: internal (data and OS system boot recovery), DAS, SAN and NAS). Also, if protecting your data means moving it offsite to another facility (or protecting data at remote sites means sending it back to the main site), replication would fit here as well. The systems in this layer should enable open choice for what storage, storage protocols and network infrastructure to use - and should best be vendor neutral. It should allow the use of the most inexpensive disk possible, even if it might be recycling decommissioned disk form the Production Tier. Further, it should be able make the most efficient use of network bandwidth if replication will be in the mix. Protection Tier This is the place for tape image (both physical and virtual) data storage, including disk-based clones if desired.
  • 5. POINT: ALL first line production data protection and recovery (with optimum RTO and RPO “dialed-in” for each business system) is done from the Recovery Tier, leaving the Protection Tier to hold only the “backups-of-the-backups”. Archive Tier It is here where the oldest data which is still worthy of retaining lives. Disk storage systems used here should be of the most cost-effective and permanent nature (i.e. slowest access performance, optical, Content Addressable Storage (CAS),. Data deduplication systems would fall into this category as well. Implementation As can be seen, stratifying storage and storage protection and recovery concepts makes plain the inherent need for a solid vision and proper planning and hardware and software and services vendor selection(s). There are many vendors, including your incumbent server and storage vendor(s), which have their own disk-based protection and recovery strategies. These by necessity are engineered to work best (and sometimes only with) their main server and/or storage products suite and, by nature this will force the technology/methodology combination onto the user, resulting in being more-or-less “locked-in” to that paradigm. Just as important to realize is that it may take multiple vendors to implement customized solutions at each layer in the model for your local and remote organization(s). Much more rewarding is to select a single vendor whose sole business is satisfying each layer in the model with hardware and software which are specifically designed and totally integrated as a unit to supply the features seamlessly. The best scenario is to have all of the software that drives each storage system in each layer below the Application Layer based on a single code set. Summary Disk-based methodologies can simplify, make more efficient, and most importantly, much more reliable, the protection and recovery of your business data. It enables you to turn from maintaining your data backup and restore as separate and labor- intensive operations with often questionable value toward merging these into a reliable, rapid and seamless operational environment which becomes part of your daily production storage operations. It can also enable customizable recovery time and recovery point objectives for each business application system, giving the ability to “dial-in” the right mix of solution capabilities, costs and scaling over time. The best way to achieve all the “goodness” of disk-based methodologies is two-fold. First, seek a tightly integrated modular solution suite from a single vendor. Further, the product set should provide components to cover each layer in the tiered model which are built on a common code platform. This approach maximizes product interoperability and reliability and minimizes operational complexity. Second, choose a product and services provider that has experience and expertise in this area, especially within the context of the chosen solution set. Demand a proven record of expertise in design, planning and