THE COMPLETE GUIDE COUCHBASE BACKUP & RECOVERY
|
|
- Blaise Norton
- 5 years ago
- Views:
Transcription
1 THE COMPLETE GUIDE COUCHBASE BACKUP & RECOVERY
2 INTRODUCTION Driven by the need to remain competitive and differentiate themselves, organizations are undergoing digital transformations and becoming increasingly data driven, leading to the proliferation of modern applications like IoT and Customer 360 built on massively scalable NoSQL data platforms including Cassandra. This has created a critical data protection gap leaving organizations exposed to data loss, unprotected against Ransomware attacks, and unable to address compliance requirements. This ebook discusses the key data protection challenges and provides guidance on what to look for in a solution.
3 UNDERSTANDING COUCHBASE BACKUP & RECOVERY REQUIREMENTS A successful backup and recovery strategy is predicated on addressing numerous functional requirements, mainly Full automation requiring no scripting Incremental-forever backups Fast and granular point-in-time recovery Agentless architecture Massive scalability Backup storage optimization Application-aware backups and restores We will detail each of these requirements in more detail in the following chapters.
4 FULLY AUTOMATED BACKUP No one likes doing backups. And with Big Data platforms, you get 3 replicated copies of your data. So why back it up? If all you care about is protection against hardware failures, perhaps replication is good enough. But replication exacerbates more common problems like user errors, application corruption or Ransomware attacks. Ok, so maybe backups are good. Now, database technologists are inherently tech savvy. They can just write scripts to handle the process, right? Not really. There are a lot of considerations: Database awareness: In addition to HDSF files, metadata and schema need to be protected Complexity: Multiple nodes and replicas are difficult to manage for backup Changes: Described later in this ebook, multiple full backups are not practical. Any solution must be able to track net changes. Copying data: Scripting must copy all SSTable files from all nodes, copy in parallel, handle errors and retries, and manage cloud APIs and storage tiering. Versioning: Scripts must track historical backups to enable multiple restore points Errors: Scripts must handle a wide variety of errors and warnings Capacity: Backup storage consumption will be high due to backup of all replicas and periodic full backups. Restores: Restores will continue to be manual, error-prone, and resource intensive RPO: With different data requiring different RPOs, scripting for this can be a challenge. These factors make scripting an incredibly painful and ongoing process. They also significantly increase risk. Unless environments are small and expected to be relatively static, a decision to script should be taken very carefully. In most cases, a 3rd-party solution is going to perform better and be less work, lower risk, and lower TCO. In the end, an organization must decide if it is better to heavily dedicate engineering resources to backup scripting with all the inherent risks or use a proven 3rd-party platform. Performance: Backup and restore performance will be slow and limited to a single server on which the script is running 4
5 THE IMPORTANCE OF INCREMENTAL FOREVER Traditionally, organizations backed up data by creating a complete backup each week, followed by daily incremental backups. For recovery, the last full backup became the starting poin to which the subsequent incremental backups were added, thus generating the image that needed to be recovered. Consider a Couchbase application with several buckets with a total data size of 20 TB. Implementing a full weekly backup of a 20 TB data set is not feasible and can never meet any reasonable service-level agreement. The only practical way to backup Couchbase and other Big Data databases is with incrementalforever techniques. A full backup will be done only once, when the backup workflow is initially set up. After that, only changes will be incrementally copied to the destination cluster. For example, when a new Hive partition is added, only the files and metadata corresponding to the new Couchbase documents are added, only the new documents need be copied to the backup cluster. 5
6 FAST AND GRANULAR RECOVERY IS THE TICKET Another requirement in the Big Data world is that incremental changes must be immediately added to the full backup to create a complete image of the primary data at a particular time. This requirement ensures that recovery can be done in a single step without the lag time associated with creation of the image for recovery using a full backup and multiple incremental backup copies. Data recovery must be application- aware and granular. For the example of a Couchbase database, the backup cluster must be able to recover a single bucket. Additionally, all buckets comprising hundreds of documents might be backed up in a single workflow. The recovery workflow needs to be flexible enough to restore a single table from this backup workflow. 6
7 SPEED YOUR WAY WITH PARALLEL DATA TRANSFERS The architectures of all Big Data platforms, from Couchbase to Impala, specify a loosely coupled, shared-nothing architecture built on commodity hardware with direct-attached cheap storage. Implicit in this design is that data is actually distributed for storage across several nodes on the primary cluster for all these Big Data applications. Good performance, therefore, will require parallel-capable backup workflows. That is, each node containing data will be contacted independently and its data copied directly from the individual container nodes on the primary cluster hosting the data. That requirement suggests that a monolithic backup solution will not scale to Big Data levels because of several chokepoints in the design. Hence, any workable Couchbase backup implementation will have to run on a scale-out platform built on commodity hardware with direct-attached drives. All the nodes in the backup cluster will set up connections to all the nodes in the primary cluster so that data can be transferred in parallel. 7
8 AVOID AGENT OVERHEAD Big Data cluster configurations are in a state of constant flux.since commodity hardware is used to deploy platforms such as Couchbase, Hadoop, and Vertica, those clusters are configured to withstand or quickly recover from failures of various components such as drives, network adapters, and even nodes in the cluster. A traditional backup solution deploys agents on primary nodes to perform data transfers. That model is not operationally feasible in a Couchbase environment because new nodes are constantly commissioned and dead nodes are decommissioned. Managing and monitoring the availability of agents that are deployed on the individual nodes is a non-trivial task due to the number of nodes in a Couchbase cluster. There are also security implications in a datacenter where authorization from the security infrastructure team is typically required before additional daemons are deployed on the production nodes. For these operational reasons, any Couchbase data protection solution will need to incorporate an agentless model with no backup software installed on the nodes of the primary cluster. 8
9 LET THE SCALABLE CATALOG DO THE HARD WORK Backing up 10s or 100s of Couchbase clusters is non-trivial. The problem becomes harder as data sets grow to 100s of terabytes and number of stored documents is in the millions or billions. A centralized backup and recovery strategy makes most sense to ensure operational simplicity and reduce costs. The number of objects that need to be versioned and monitored in the Big Data world is in the millions, and the catalog to support these many objects will have to scale horizontally. For example, a Couchbase data store might easily have thousands of documents. Assuming a typical change rate, every incremental backup will add a large number of objects. These objects will have to be mapped to an appropriate recover point. A catalog will need extensive search capabilities and must scale to Big Data levels. Metadata of the objects will need to be stored, and the mutations of the metadata must be searchable across different versions and transitions. 9
10 BACKUP STORAGE OPTIMIZATION By its very nature Big Data is, well, big. Fully protecting your Couchbase environment can consume a huge amount of storage. To reduce these potential costs, organizations should squeeze data into the smallest possible footprint and move it to the lowest-cost storage tier, all without impacting performance. A robust deduplication and compression methodology can reduce data needs by up to 90%. When you consider the potential size of Couchbase backups, that can lead to huge savings. But in addition to reduction factor, deduplication and compression need to be high performance, since they do take time and compute cycles to complete, during which you are at increased risk. The best footprint optimization methodologies generate the smallest storage requirement in the shortest duration. Minimizing the footprint is only half the process, though. All storage cost is not created equal. Direct attached flash is going to cost considerably more than cloud storage, and long-term cloud storage will cost less than transactional cloud storage. But with data classification and policies (performance, compliance) often shifting, data placement needs to remain highly dynamic. Ensuring that your data is always on the lowestcost storage that still meets SLAs is a near impossibility for both human and script alike. Some form of automation is needed to fully optimize for cost and risk. 10
11 APPLICATION-AWARE BACKUPS AND RESTORES The Big Data world involves different applications with different types of data abstractions. For example, data in Couchbase is stored in buckets and documents while the abstraction layer for Hive focuses on databases, tables, and partitions. These differences impact backup requirements in several ways. For example, the user setting up workflows needs to interact with the backup system at the data abstraction layer supported by the application. Another requirement is that all the metadata and attributes associated with the abstraction layer also need to be backed up. For example, with Couchbase, we backup and restore bucket properties, view definition, and index definition. 11
12 WHY ARE WE PASSIONATE ABOUT THIS? We have witnessed numerous companies feel the pain of losing Big Data and that inspired us to create Imanis Data. Our software solution is built on a fully scale-out architecture and supports commodity hardware including direct-attached, network-attached, or cloud-attached, software-defined storage. We use an incremental-forever model to fetch only modified objects from the primary cluster. We are completely application-aware. For an application like Couchbase, we pull bucket metadata information like configuration, indexes, & views. Any recovery of the bucket will ensure that the metdata associated with the bucket, are applied to the recovered bucket. We are also agentless. No Imanis Data software need be installed on any of the nodes of the Couchbase cluster. The catalog is architected to host millions of versioned objects along with their attributes and properties. It is searchable with different attributes and regular expressions. In addition to backup/recovery, we also support cloud migration, test data management, and enhanced security and compliance. To learn more or to schedule an introductory meeting, please contact info@imanisdata.com.
13 Imanis Data, Inc Zanker Road, Suite 109, San Jose CA imanisdata.com 2018 Imanis Data, Inc. All rights reserved. Imanis Data and the Imanis Data logo are trademarks of Imanis Data in the US and in other countries. Information subject to change without notice. All other trademarks and service marks are property of their respective owners.
THE COMPLETE GUIDE HADOOP BACKUP & RECOVERY
THE COMPLETE GUIDE HADOOP BACKUP & RECOVERY INTRODUCTION Driven by the need to remain competitive and differentiate themselves, organizations are undergoing digital transformations and becoming increasingly
More informationArchiving, Backup, and Recovery for Complete the Promise of Virtualisation Unified information management for enterprise Windows environments
Archiving, Backup, and Recovery for Complete the Promise of Virtualisation Unified information management for enterprise Windows environments The explosion of unstructured information It is estimated that
More informationVeeam Availability Solution for Cisco UCS: Designed for Virtualized Environments. Solution Overview Cisco Public
Veeam Availability Solution for Cisco UCS: Designed for Virtualized Environments Veeam Availability Solution for Cisco UCS: Designed for Virtualized Environments 1 2017 2017 Cisco Cisco and/or and/or its
More informationUnderstanding Virtual System Data Protection
Understanding Virtual System Data Protection Server virtualization is the most important new technology introduced in the data center in the past decade. It has changed the way we think about computing
More informationRemove complexity in protecting your virtual infrastructure with. IBM Spectrum Protect Plus. Data availability made easy. Overview
Overview Challenge In your organization, backup management is too complex and consumes too much time and too many IT resources. Solution IBM Spectrum Protect Plus dramatically simplifies data protection
More informationData Protection for Virtualized Environments
Technology Insight Paper Data Protection for Virtualized Environments IBM Spectrum Protect Plus Delivers a Modern Approach By Steve Scully, Sr. Analyst February 2018 Modern Data Protection for Virtualized
More informationYour Complete Guide to Backup and Recovery for MongoDB
Your Complete Guide to Backup and Recovery for MongoDB EBOOK Your Complete Guide to Backup and Recovery for MongoDB Table of Contents Part I: Backup and Recovery for MongoDB Part II: Customer Case Study
More informationIBM Spectrum Protect Plus
IBM Spectrum Protect Plus Simplify data recovery and data reuse for VMs, files, databases and applications Highlights Achieve rapid VM, file, database, and application recovery Protect industry-leading
More informationTOP REASONS TO CHOOSE DELL EMC OVER VEEAM
HANDOUT TOP REASONS TO CHOOSE DELL EMC OVER VEEAM 10 This handout overviews the top ten reasons why customers choose Data Protection from Dell EMC over Veeam. Dell EMC has the most comprehensive data protection
More informationProtecting Mission-Critical Application Environments The Top 5 Challenges and Solutions for Backup and Recovery
White Paper Business Continuity Protecting Mission-Critical Application Environments The Top 5 Challenges and Solutions for Backup and Recovery Table of Contents Executive Summary... 1 Key Facts About
More informationCONFIGURATION GUIDE WHITE PAPER JULY ActiveScale. Family Configuration Guide
WHITE PAPER JULY 2018 ActiveScale Family Configuration Guide Introduction The world is awash in a sea of data. Unstructured data from our mobile devices, emails, social media, clickstreams, log files,
More informationScalable backup and recovery for modern applications and NoSQL databases. Best practices for cloud-native applications and NoSQL databases on AWS
Scalable backup and recovery for modern applications and NoSQL databases Best practices for cloud-native applications and NoSQL databases on AWS NoSQL databases running on the cloud need a cloud-native
More informationWhen, Where & Why to Use NoSQL?
When, Where & Why to Use NoSQL? 1 Big data is becoming a big challenge for enterprises. Many organizations have built environments for transactional data with Relational Database Management Systems (RDBMS),
More informationThe Definitive Guide to Backup and Recovery for Cassandra
The Definitive Guide to Backup and Recovery for Cassandra EBOOK The Definitive Guide to Backup and Recovery for Cassandra Table of Contents Executive Summary 1. Cassandra Technology Overview 2. The Need
More informationChapter 1. Storage Concepts. CommVault Concepts & Design Strategies: https://www.createspace.com/
Chapter 1 Storage Concepts 4 - Storage Concepts In order to understand CommVault concepts regarding storage management we need to understand how and why we protect data, traditional backup methods, and
More informationTop Trends in DBMS & DW
Oracle Top Trends in DBMS & DW Noel Yuhanna Principal Analyst Forrester Research Trend #1: Proliferation of data Data doubles every 18-24 months for critical Apps, for some its every 6 months Terabyte
More informationCommvault Backup to Cloudian Hyperstore CONFIGURATION GUIDE TO USE HYPERSTORE AS A STORAGE LIBRARY
Commvault Backup to Cloudian Hyperstore CONFIGURATION GUIDE TO USE HYPERSTORE AS A STORAGE LIBRARY CONTENTS EXECUTIVE SUMMARY... 2 SOLUTION OVERVIEW... 3 USE CASES... 4 SOLUTION COMPONENTS... 5 Commvault
More informationNEXT BIG THING. Edgemo Summit Martin Plesner-Jacobsen Team Lead Nordic
NEXT BIG THING Edgemo Summit 2016 Martin Plesner-Jacobsen Team Lead Nordic HQ Baar, Switzerland Founded in 2006, Veeam currently has 205,000 customers 41,000 ProPartners 2,200 employees worldwide 205,000+
More informationData Protection Modernization: Meeting the Challenges of a Changing IT Landscape
Data Protection Modernization: Meeting the Challenges of a Changing IT Landscape Tom Clark IBM Distinguished Engineer, Chief Architect Software 1 Data growth is continuing to explode Sensors & Devices
More informationWhite paper: Agentless Backup is Not a Myth. Agentless Backup is Not a Myth
White paper: less Backup is Not a Myth less Backup is Not a Myth White paper: less Backup is Not a Myth Executive Summary Backup and recovery software typically requires agents that are installed onto
More informationThe Definitive Guide to MongoDB Backup and Recovery
The Definitive Guide to MongoDB Backup and Recovery EBOOK The Definitive Guide to MongoDB Backup and Recovery Table of Contents Executive Summary 1. MongoDB Technology Overview 2. The Need for Backup &
More informationMarket Report. Scale-out 2.0: Simple, Scalable, Services- Oriented Storage. Scale-out Storage Meets the Enterprise. June 2010.
Market Report Scale-out 2.0: Simple, Scalable, Services- Oriented Storage Scale-out Storage Meets the Enterprise By Terri McClure June 2010 Market Report: Scale-out 2.0: Simple, Scalable, Services-Oriented
More informationSolution Brief: Commvault HyperScale Software
Solution Brief: Commvault HyperScale Software ENTERPRISE IT SHIFTS Enterprise IT is being transformed with the maturing of public cloud providers that offer compute, storage and application services with
More informationTintri Cloud Connector
TECHNICAL WHITE PAPER Tintri Cloud Connector Technology Primer & Deployment Guide www.tintri.com Revision History Version Date Description Author 1.0 12/15/2017 Initial Release Bill Roth Table 1 - Revision
More informationVMware vsphere Data Protection 5.8 TECHNICAL OVERVIEW REVISED AUGUST 2014
VMware vsphere Data Protection 5.8 TECHNICAL OVERVIEW REVISED AUGUST 2014 Table of Contents Introduction.... 3 Features and Benefits of vsphere Data Protection... 3 Additional Features and Benefits of
More informationTechnology Insight Series
EMC Avamar for NAS - Accelerating NDMP Backup Performance John Webster June, 2011 Technology Insight Series Evaluator Group Copyright 2011 Evaluator Group, Inc. All rights reserved. Page 1 of 7 Introduction/Executive
More informationINFINIDAT Data Protection. White Paper
INFINIDAT Data Protection White Paper Abstract As data has taken on the role of being the lifeblood of business, protecting that data is the most important task IT has in the datacenter today. Data protection
More informationDATA PROTECTION SOLUTION MICROSOFT SQL SERVER
DATA PROTECTION SOLUTION MICROSOFT SQL SERVER For more information, refer to Reduxio Systems Inc. website at http://www.reduxio.com. If you have comments about this documentation, submit your feedback
More informationCloud Backup and Recovery for Healthcare and ecommerce
Get Your Cloud Backup On Cloud Backup and Recovery for Healthcare and ecommerce Peter Smails, Vice President, Marketing & Business Development Shalabh Goyal, Director, Product Management October 12 th,
More informationBoost your data protection with NetApp + Veeam. Schahin Golshani Technical Partner Enablement Manager, MENA
Boost your data protection with NetApp + Veeam Schahin Golshani Technical Partner Enablement Manager, MENA NetApp Product Strategy Market-leading innovations, that are NetApp Confidential Limited Use 3
More informationWhat's New in vsan 6.2 First Published On: Last Updated On:
First Published On: 07-07-2016 Last Updated On: 08-23-2017 1 1. Introduction 1.1.Preface 1.2.Architecture Overview 2. Space Efficiency 2.1.Deduplication and Compression 2.2.RAID - 5/6 (Erasure Coding)
More informationHow To Guide: Long Term Archive for Rubrik. Using SwiftStack Storage as a Long Term Archive for Rubrik
Using SwiftStack Storage as a Long Term Archive for Rubrik Introduction 3 Solution Architecture 5 Example Design 5 Multi Region Cluster 6 Network Design 6 Minimum Supported Versions and Solution Limits
More informationHYCU and ExaGrid Hyper-converged Backup for Nutanix
HYCU and ExaGrid Hyper-converged Backup for Nutanix Backing Up and Recovering Data: Nutanix, ExaGrid and HYCU As IT data centers move to hyper-converged infrastructure, new and innovative backup approaches
More informationTable of Contents... 2
5 Steps to Apache Cassandra Success with DataStax 1 2 4 3 5 Table of Contents Table of Contents... 2 Abstract... 3 Choosing the Right Database Technology... 3 Implementing a System on DataStax Enterprise...
More informationDaily, Weekly or Monthly Partitions? A discussion of several factors for this important decision
Daily, Weekly or Monthly Partitions? A discussion of several factors for this important decision Copyright 2006 Mercury Consulting Published in July 2006 Conventions The following typographical conventions
More informationTitle DC Automation: It s a MARVEL!
Title DC Automation: It s a MARVEL! Name Nikos D. Anagnostatos Position Network Consultant, Network Solutions Division Classification ISO 27001: Public Data Center Evolution 2 Space Hellas - All Rights
More informationMicrosoft SQL Server HA and DR with DVX
Microsoft SQL Server HA and DR with DVX 385 Moffett Park Dr. Sunnyvale, CA 94089 844-478-8349 www.datrium.com Technical Report Introduction A Datrium DVX solution allows you to start small and scale out.
More informationThe Microsoft Large Mailbox Vision
WHITE PAPER The Microsoft Large Mailbox Vision Giving users large mailboxes without breaking your budget Introduction Giving your users the ability to store more email has many advantages. Large mailboxes
More informationToward Energy-efficient and Fault-tolerant Consistent Hashing based Data Store. Wei Xie TTU CS Department Seminar, 3/7/2017
Toward Energy-efficient and Fault-tolerant Consistent Hashing based Data Store Wei Xie TTU CS Department Seminar, 3/7/2017 1 Outline General introduction Study 1: Elastic Consistent Hashing based Store
More informationIntroduction to K2View Fabric
Introduction to K2View Fabric 1 Introduction to K2View Fabric Overview In every industry, the amount of data being created and consumed on a daily basis is growing exponentially. Enterprises are struggling
More informationThe vsphere 6.0 Advantages Over Hyper- V
The Advantages Over Hyper- V The most trusted and complete virtualization platform SDDC Competitive Marketing 2015 Q2 VMware.com/go/PartnerCompete 2015 VMware Inc. All rights reserved. v3b The Most Trusted
More informationNew Approach to Unstructured Data
Innovations in All-Flash Storage Deliver a New Approach to Unstructured Data Table of Contents Developing a new approach to unstructured data...2 Designing a new storage architecture...2 Understanding
More informationEight Tips for Better Archives. Eight Ways Cloudian Object Storage Benefits Archiving with Veritas Enterprise Vault
Eight Tips for Better Email Archives Eight Ways Cloudian Object Storage Benefits Email Archiving with Veritas Enterprise Vault Most organizations now manage terabytes, if not petabytes, of corporate and
More informationSymantec NetBackup 7 for VMware
V-Ray visibility into virtual machine protection Overview There s little question that server virtualization is the single biggest game-changing trend in IT today. Budget-strapped IT departments are racing
More informationVirtual protection gets real
Virtual protection gets real How to protect virtual machines from downtime and data loss 5 must-have features for VM backup Businesses virtualize to consolidate resources, reduce costs and increase workforce
More informationREFERENCE ARCHITECTURE Quantum StorNext and Cloudian HyperStore
REFERENCE ARCHITECTURE Quantum StorNext and Cloudian HyperStore CLOUDIAN + QUANTUM REFERENCE ARCHITECTURE 1 Table of Contents Introduction to Quantum StorNext 3 Introduction to Cloudian HyperStore 3 Audience
More informationvsan Disaster Recovery November 19, 2017
November 19, 2017 1 Table of Contents 1. Disaster Recovery 1.1.Overview 1.2.vSAN Stretched Clusters and Site Recovery Manager 1.3.vSAN Performance 1.4.Summary 2 1. Disaster Recovery According to the United
More informationRedefine Data Protection: Next Generation Backup And Business Continuity
Redefine Data Protection: Next Generation Backup And Business Continuity 1 Business Is Being Redefined Leveraging the Power of Technology Megatrends CLOUD MOBILE SOCIAL BIG DATA 2 Creating New Next Gen
More informationVMware vsphere Data Protection Evaluation Guide REVISED APRIL 2015
VMware vsphere Data Protection REVISED APRIL 2015 Table of Contents Introduction.... 3 Features and Benefits of vsphere Data Protection... 3 Requirements.... 4 Evaluation Workflow... 5 Overview.... 5 Evaluation
More informationNOSQL OPERATIONAL CHECKLIST
WHITEPAPER NOSQL NOSQL OPERATIONAL CHECKLIST NEW APPLICATION REQUIREMENTS ARE DRIVING A DATABASE REVOLUTION There is a new breed of high volume, highly distributed, and highly complex applications that
More informationProtecting Microsoft Hyper-V 3.0 Environments with Arcserve
Protecting Microsoft Hyper-V 3.0 Environments with Arcserve Adding value to your Hyper-V environment. Today, you face demanding service level agreements (SLAs) while having to address staffing and budget
More informationHow to Protect SAP HANA Applications with the Data Protection Suite
White Paper Business Continuity How to Protect SAP HANA Applications with the Data Protection Suite As IT managers realize the benefits of in-memory database technology, they are accelerating their plans
More informationOptimizing Apache Spark with Memory1. July Page 1 of 14
Optimizing Apache Spark with Memory1 July 2016 Page 1 of 14 Abstract The prevalence of Big Data is driving increasing demand for real -time analysis and insight. Big data processing platforms, like Apache
More informationActive Archive and the State of the Industry
Active Archive and the State of the Industry Taking Data Archiving to the Next Level Abstract This report describes the state of the active archive market. New Applications Fuel Digital Archive Market
More informationStorageCraft OneXafe and Veeam 9.5
TECHNICAL DEPLOYMENT GUIDE NOV 2018 StorageCraft OneXafe and Veeam 9.5 Expert Deployment Guide Overview StorageCraft, with its scale-out storage solution OneXafe, compliments Veeam to create a differentiated
More informationUpgrade Your MuleESB with Solace s Messaging Infrastructure
The era of ubiquitous connectivity is upon us. The amount of data most modern enterprises must collect, process and distribute is exploding as a result of real-time process flows, big data, ubiquitous
More informationSymantec Enterprise Vault
Store, Manage, and Discover Critical Business Information The pressure on organizations to protect and manage data has intensified with the recent growth in unstructured data and the reliance on email
More informationWHITE PAPER: ENTERPRISE SOLUTIONS. Disk-Based Data Protection Achieving Faster Backups and Restores and Reducing Backup Windows
WHITE PAPER: ENTERPRISE SOLUTIONS Disk-Based Data Protection Achieving Faster Backups and Restores and Reducing Backup Windows White Paper: Enterprise Security Disk-Based Data Protection Achieving Faster
More informationCatalogic DPX: Backup Done Right
Catalogic DPX: Backup Done Right The Backup Alternative You ve Been Waiting For Catalogic DPX Highlights Fast and reliable low-impact backup for physical and virtual environments Direct access to data
More informationMicrosoft SQL Server
Microsoft SQL Server Abstract This white paper outlines the best practices for Microsoft SQL Server Failover Cluster Instance data protection with Cohesity DataPlatform. December 2017 Table of Contents
More informationDesign Patterns for the Cloud. MCSN - N. Tonellotto - Distributed Enabling Platforms 68
Design Patterns for the Cloud 68 based on Amazon Web Services Architecting for the Cloud: Best Practices Jinesh Varia http://media.amazonwebservices.com/aws_cloud_best_practices.pdf 69 Amazon Web Services
More informationSECURE CLOUD BACKUP AND RECOVERY
SECURE CLOUD BACKUP AND RECOVERY Learn more about how KeepItSafe can help to reduce costs, save time, and provide compliance for online backup, disaster recovery-as-a-service, mobile data protection, and
More informationOracle Zero Data Loss Recovery Appliance (ZDLRA)
Oracle Zero Data Loss Recovery Appliance (ZDLRA) Overview Attila Mester Principal Sales Consultant Data Protection Copyright 2015, Oracle and/or its affiliates. All rights reserved. Safe Harbor Statement
More informationVirtualization & On-Premise Cloud
Key Solutions Virtualization & On-Premise Cloud Hive Fabric provides the economics and simplicity of the Public Cloud in your data center. No more VMware Tax or proprietary HCI hardware. Expensive, proprietary,
More informationThe storage challenges of virtualized environments
The storage challenges of virtualized environments The virtualization challenge: Ageing and Inflexible storage architectures Mixing of platforms causes management complexity Unable to meet the requirements
More informationDesigning Data Protection Strategies for Oracle Databases
WHITE PAPER Designing Data Protection Strategies for Oracle Databases VERITAS Backup Exec 9.1 for Windows Servers Agent for Oracle 11/20/2003 1 TABLE OF CONTENTS Introduction...3 Oracle Backup Basics...3
More informationpowered by Cloudian and Veritas
Lenovo Storage DX8200C powered by Cloudian and Veritas On-site data protection for Amazon S3-compliant cloud storage. assistance from Lenovo s world-class support organization, which is rated #1 for overall
More informationCohesity Microsoft Azure Data Box Integration
Cohesity Microsoft Azure Data Box Integration Table of Contents Introduction...2 Audience...2 Requirements...2 Assumptions...2 Order Microsoft Azure Data Box...3 Requesting...3 Order Details...4 Shipping
More informationCisco Cloud Services Router 1000V and Amazon Web Services CASE STUDY
Cisco Cloud Services Router 1000V and Amazon Web Services CASE STUDY CASE STUDY ADOBE 2 About Adobe Adobe Systems provides digital media and marketing solutions to customers around the world including
More informationTopics. Big Data Analytics What is and Why Hadoop? Comparison to other technologies Hadoop architecture Hadoop ecosystem Hadoop usage examples
Hadoop Introduction 1 Topics Big Data Analytics What is and Why Hadoop? Comparison to other technologies Hadoop architecture Hadoop ecosystem Hadoop usage examples 2 Big Data Analytics What is Big Data?
More informationVirtualization. Disaster Recovery. A Foundation for Disaster Recovery in the Cloud
Technology Paper Disaster Acronym: DR The process, policies, and procedures that enable a business to recover data and systems after a disaster. A Foundation for Disaster in the Cloud Introduction Virtualization
More informationHOW TO AVOID STORAGE. Leveraging Flash Memory and Breakthrough Architecture to Accelerate Performance, Simplify Management, and Protect Your Data
HOW TO AVOID THE SINS OF STORAGE Leveraging Flash Memory and Breakthrough Architecture to Accelerate Performance, Simplify Management, and Protect Your Data NIMBLE STORAGE: PAGE 1 www.rdc.uk.com 1 S ome
More informationAt-Scale Data Centers & Demand for New Architectures
Allen Samuels At-Scale Data Centers & Demand for New Architectures Software Architect, Software and Systems Solutions June 4, 2015 1 Forward-Looking Statements During our meeting today we may make forward-looking
More informationECONOMICAL, STORAGE PURPOSE-BUILT FOR THE EMERGING DATA CENTERS. By George Crump
ECONOMICAL, STORAGE PURPOSE-BUILT FOR THE EMERGING DATA CENTERS By George Crump Economical, Storage Purpose-Built for the Emerging Data Centers Most small, growing businesses start as a collection of laptops
More informationTrends in Data Protection and Restoration Technologies. Mike Fishman, EMC 2 Corporation
Trends in Data Protection and Restoration Technologies Mike Fishman, EMC 2 Corporation SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless otherwise noted. Member
More informationProtecting VMware vsphere/esx Environments with CA ARCserve
Solution Brief: CA ARCserve R16.5 Complexity ate my budget Protecting VMware vsphere/esx Environments with CA ARCserve Customer Challenges Today, you face demanding service level agreements (SLAs) while
More informationUsing Self-Protecting Storage to Lower Backup TCO
Economic Insight Paper Using Self-Protecting Storage to Lower Backup TCO A TCO comparison of NetApp s integrated data protection solution vs. a traditional backup to an external PBBA By John Webster, Sr.
More informationVMWARE PROTECTION WITH DELL EMC NETWORKER 9
VMWARE PROTECTION WITH DELL EMC NETWORKER 9 Solution Overview ABSTRACT This white paper describes the integration of Dell EMC NetWorker with VMware vcenter. It also includes details on the NetWorker architecture
More informationZero Data Loss Recovery Appliance DOAG Konferenz 2014, Nürnberg
Zero Data Loss Recovery Appliance Frank Schneede, Sebastian Solbach Systemberater, BU Database, Oracle Deutschland B.V. & Co. KG Safe Harbor Statement The following is intended to outline our general product
More informationLambda Architecture for Batch and Stream Processing. October 2018
Lambda Architecture for Batch and Stream Processing October 2018 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Notices This document is provided for informational purposes only.
More informationEMC Integrated Infrastructure for VMware. Business Continuity
EMC Integrated Infrastructure for VMware Business Continuity Enabled by EMC Celerra and VMware vcenter Site Recovery Manager Reference Architecture Copyright 2009 EMC Corporation. All rights reserved.
More informationElevate the Conversation: Put IT Resilience into Practice for Cloud Service Providers
Elevate the Conversation: Put IT Resilience into Practice for Cloud Service Providers Don Wales, VP, Global Cloud Sales Mariah West, Director, Global Marketing Programs & Operations IT Resilience Protect
More informationAbstract. The Challenges. ESG Lab Review InterSystems IRIS Data Platform: A Unified, Efficient Data Platform for Fast Business Insight
ESG Lab Review InterSystems Data Platform: A Unified, Efficient Data Platform for Fast Business Insight Date: April 218 Author: Kerry Dolan, Senior IT Validation Analyst Abstract Enterprise Strategy Group
More informationA BigData Tour HDFS, Ceph and MapReduce
A BigData Tour HDFS, Ceph and MapReduce These slides are possible thanks to these sources Jonathan Drusi - SCInet Toronto Hadoop Tutorial, Amir Payberah - Course in Data Intensive Computing SICS; Yahoo!
More informationMAPR TECHNOLOGIES, INC. TECHNICAL BRIEF APRIL 2017 MAPR SNAPSHOTS
MAPR TECHNOLOGIES, INC. TECHNICAL BRIEF APRIL 2017 MAPR SNAPSHOTS INTRODUCTION The ability to create and manage snapshots is an essential feature expected from enterprise-grade storage systems. This capability
More informationVeritas Backup Exec. Powerful, flexible and reliable data protection designed for cloud-ready organizations. Key Features and Benefits OVERVIEW
Veritas Backup Exec Powerful, flexible and reliable data protection designed for cloud-ready organizations. OVERVIEW Veritas Backup Exec is the backup solution without barriers, delivered your way. You
More informationReal-time Protection for Microsoft Hyper-V
Real-time Protection for Microsoft Hyper-V Introduction Computer virtualization has come a long way in a very short time, triggered primarily by the rapid rate of customer adoption. Moving resources to
More informationChapter 10 Protecting Virtual Environments
Chapter 10 Protecting Virtual Environments 164 - Protecting Virtual Environments As more datacenters move to virtualize their environments and the number of virtual machines and the physical hosts they
More informationThe Google File System
The Google File System Sanjay Ghemawat, Howard Gobioff and Shun Tak Leung Google* Shivesh Kumar Sharma fl4164@wayne.edu Fall 2015 004395771 Overview Google file system is a scalable distributed file system
More informationControlling Costs and Driving Agility in the Datacenter
Controlling Costs and Driving Agility in the Datacenter Optimizing Server Infrastructure with Microsoft System Center Microsoft Corporation Published: November 2007 Executive Summary To help control costs,
More informationUsing Computer Associates BrightStor ARCserve Backup with Microsoft Data Protection Manager
White Paper Using Computer Associates BrightStor ARCserve Backup with Microsoft Data Protection Manager Author(s): Computer Associates International and Microsoft Corporation Published September 2005 Abstract
More informationService Mesh and Microservices Networking
Service Mesh and Microservices Networking WHITEPAPER Service mesh and microservice networking As organizations adopt cloud infrastructure, there is a concurrent change in application architectures towards
More informationProtecting Microsoft SharePoint
TECHNICAL WHITE PAPER: BACKUP EXEC TM 2014 PROTECTING MICROSOFT SHAREPOINT Backup Exec TM 2014 Technical White Paper Protecting Microsoft SharePoint Technical White Papers are designed to introduce Symantec
More informationHPE 3PAR File Persona on HPE 3PAR StoreServ Storage with Veritas Enterprise Vault
HPE 3PAR File Persona on HPE 3PAR StoreServ Storage with Veritas Enterprise Vault Solution overview and best practices for data preservation with Veritas Enterprise Vault Technical white paper Technical
More informationXtremIO Business Continuity & Disaster Recovery. Aharon Blitzer & Marco Abela XtremIO Product Management
XtremIO Business Continuity & Disaster Recovery Aharon Blitzer & Marco Abela XtremIO Product Management Agenda XtremIO Current BC/DR Offerings New BC/DR Offering Benefits of New Offering Technical Overview
More informationTHE JOURNEY OVERVIEW THREE PHASES TO A SUCCESSFUL MIGRATION ADOPTION ACCENTURE IS 80% IN THE CLOUD
OVERVIEW Accenture is in the process of transforming itself into a digital-first enterprise. Today, Accenture is 80 percent in a public cloud. As the journey continues, Accenture shares its key learnings
More informationVeeam and HP: Meet your backup data protection goals
Sponsored by Veeam and HP: Meet your backup data protection goals Eric Machabert Сonsultant and virtualization expert Introduction With virtualization systems becoming mainstream in recent years, backups
More informationTen things hyperconvergence can do for you
Ten things hyperconvergence can do for you Francis O Haire Director, Technology & Strategy DataSolutions Evolution of Enterprise Infrastructure 1990s Today Virtualization Server Server Server Server Scale-Out
More informationThe Data-Protection Playbook for All-flash Storage KEY CONSIDERATIONS FOR FLASH-OPTIMIZED DATA PROTECTION
The Data-Protection Playbook for All-flash Storage KEY CONSIDERATIONS FOR FLASH-OPTIMIZED DATA PROTECTION The future of storage is flash The all-flash datacenter is a viable alternative You ve heard it
More informationDesigning Data Protection Strategies for Oracle Databases
WHITE PAPER Designing Data Protection Strategies for Oracle Databases VERITAS Backup Exec 9.0 for Windows Servers Agent for Oracle VERSION INCLUDES TABLE OF CONTENTS STYLES 1 TABLE OF CONTENTS Introduction...3
More information