THE COMPLETE GUIDE HADOOP BACKUP & RECOVERY
|
|
- Ann Porter
- 5 years ago
- Views:
Transcription
1 THE COMPLETE GUIDE HADOOP BACKUP & RECOVERY
2 INTRODUCTION Driven by the need to remain competitive and differentiate themselves, organizations are undergoing digital transformations and becoming increasingly data driven, leading to the proliferation of modern applications like IoT and Customer 360 built on massively scalable NoSQL data platforms including Hadoop. This has created a critical data protection gap leaving organizations exposed to data loss, unprotected against Ransomware attacks, and unable to address compliance requirements. This ebook discusses the key data protection challenges and provides guidance on what to look for in a solution.
3 UNDERSTANDING HADOOP BACKUP & RECOVERY REQUIREMENTS A successful backup and recovery strategy is predicated on addressing numerous functional requirements, mainly Full automation requiring no scripting Incremental-forever backups Fast and granular point-in-time recovery Agentless architecture Massive scalability Backup storage optimization Application-aware backups and restores We will detail each of these requirements in more detail in the following chapters.
4 FULLY AUTOMATED BACKUP No one likes doing backups. And with Big Data platforms, you get 3 replicated copies of your data. So why back it up? If all you care about is protection against hardware failures, perhaps replication is good enough. But replication exacerbates more common problems like user errors, application corruption or Ransomware attacks. Ok, so maybe backups are good. Now, Hadoop technologists are inherently tech savvy. They can just write scripts to handle the process, right? Not really. There are a lot of considerations: Database awareness: In addition to HDSF files, metadata and schema need to be protected Complexity: Multiple nodes and replicas are difficult to manage for backup Changes: Described later in this ebook, multiple full backups are not practical. Any solution must be able to track net changes. Copying data: Scripting must copy metadata from the NameNode as well as all DataNodes, copy in parallel, handle errors and retries, and manage cloud API s and storage tiering. Versioning: Scripts must track historical backups to enable multiple restore points Errors: Scripts must handle a wide variety of errors and warnings Capacity: Backup storage consumption will be high due to backup of all replicas and periodic full backups. Restores: Restores will continue to be manual, error-prone, and resource intensive RPO: With different data requiring different RPOs, scripting for this can be a challenge. These factors make scripting an incredibly painful and ongoing process. They also significantly increase risk. Unless environments are small and expected to be relatively static, a decision to script should be taken very carefully. In most cases, a 3rd-party solution is going to perform better and be less work, lower risk, and lower TCO. In the end, an organization must decide if it is better to heavily dedicate engineering resources to backup scripting with all the inherent risks or use a proven 3rd-party platform. Performance: Backup and restore performance will be slow and limited to a single server on which the script is running 4
5 THE IMPORTANCE OF INCREMENTAL FOREVER Traditionally, organizations backed up data by creating a complete backup each week, followed by daily incremental backups. For recovery, the last full backup became the starting point to which the subsequent incremental backups were added, thus generating the image that needed to be recovered. Consider a Hive application with several databases with a total data size of 1 petabyte. Implementing a full weekly backup of a 1-petabyte data set is not feasible and can never meet any reasonable service-level agreement. The only practical way to backup Big Data is with incremental-forever techniques. A full backup will be done only once, when the backup workflow is initially set up. After that, only changes will be incrementally copied to the destination cluster. For example, when a new Hive partition is added, only the files and metadata corresponding to the new Hive partition need be copied to the backup cluster. 5
6 FAST AND GRANULAR RECOVERY IS THE TICKET Another requirement in the Big Data world is that incremental changes must be immediately added to the full backup to create a complete image of the primary data at a particular time. This requirement ensures that recovery can be done in a single step without the lag time associated with creation of the image for recovery. Data recovery must be applicationaware and granular. For the example of a Hive database, the backup cluster must be able to recover a single table or partition of a database. Additionally, an entire database or schema comprising hundreds of tables might be backed up in a single workflow. The recovery workflow needs to be flexible enough to restore a single table from this backup workflow. 6
7 SPEED YOUR WAY WITH PARALLEL DATA TRANSFERS The architectures of all Big Data platforms, from Hadoop to NoSQL, specify a loosely coupled, shared-nothing architecture built on commodity hardware with direct-attached cheap storage. Implicit in this design is that data is actually distributed for storage across several nodes on the primary cluster for all these Big Data applications. Good performance, therefore, will require parallel-capable backup workflows. That is, each node containing data will be contacted independently and its data copied directly from the individual container nodes on the primary cluster hosting the data. That requirement suggests that a monolithic backup solution will not scale to Big Data levels because of several chokepoints in the design. Hence, any workable Hadoop backup implementation will have to run on a scale-out platform built on commodity hardware with direct-attached drives. All the nodes in the backup cluster will set up connections to all the nodes in the primary cluster so that data can be transferred in parallel. 7
8 AVOID AGENT OVERHEAD Big Data cluster configurations are in a state of constant flux. Since commodity hardware is used to deploy platforms such as Hadoop, Cassandra, and Vertica, those clusters are configured to withstand or quickly recover from failures of various components such as drives, network adapters, and even nodes in the cluster. A traditional backup solution deploys agents on primary nodes to perform data transfers. That model is not operationally feasible in a distributed environment like Hadoop because new nodes are constantly commissioned and dead nodes are decommissioned. Managing and monitoring the availability of agents that are deployed on the individual nodes is a non-trivial task due to the number of nodes in a Hadoop cluster. There are also security implications in a datacenter where authorization from the security infrastructure team is typically required before additional daemons are deployed on the production nodes. For these operational reasons, any Hadoop data protection solution will need to incorporate an agentless model with no backup software installed on the nodes of the primary cluster. 8
9 LET THE SCALABLE CATALOG DO THE HARD WORK The number of objects that need to be versioned and monitored in the Big Data world is in the millions, and the catalog to support these many objects will have to scale horizontally. For example, an HDFS data store might easily have a million files and directories. Assuming a typical change rate, every incremental backup will add a large number of objects. These objects will have to be mapped to an appropriate recover point. A catalog will need extensive search capabilities and must scale to Big Data levels. Metadata of the objects will need to be stored, and the mutations of the metadata must be searchable across different versions and transitions. 9
10 BACKUP STORAGE OPTIMIZATION By its very nature Big Data is, well, big. Fully protecting your Hadoop environment can consume a huge amount of storage. To reduce these potential costs, organizations should squeeze data into the smallest possible footprint and move it to the lowest-cost storage tier, all without impacting performance. A robust deduplication and compression methodology can reduce data needs by up to 90%. When you consider the potential size of Hadoop backups, that can lead to huge savings. But in addition to reduction factor, deduplication and compression need to be high performance, since they do take time and compute cycles to complete, during which you are at increased risk. The best footprint optimization methodologies generate the smallest storage requirement in the shortest duration. Minimizing the footprint is only half the process, though. All storage cost is not created equal. Direct attached flash is going to cost considerably more than cloud storage, and long-term cloud storage will cost less than transactional cloud storage. But with data classification and policies (performance, compliance) often shifting, data placement needs to remain highly dynamic. Ensuring that your data is always on the lowestcost storage that still meets SLAs is a near impossibility for both human and script alike. Some form of automation is needed to fully optimize for cost and risk. 10
11 APPLICATION-AWARE BACKUPS AND RESTORES The Big Data world involves different applications with different types of data abstractions. For example, data in Hive is stored in databases and tables while the abstraction layer for HDFS focuses on files and directories. These differences impact backup requirements in several ways. For example, the user setting up workflows needs to interact with the backup system at the data abstraction layer supported by the application. Another requirement is that all the metadata and attributes associated with the abstraction layer also need to be backed up. For example, the metadata in a Hive metastore will have to be protected in addition to the actual directories and files representing the database and tables. 11
12 WHY ARE WE PASSIONATE ABOUT THIS? We have witnessed numerous companies feel the pain of losing Big Data and that inspired us to create Imanis Data. Our software solution is built on a fully scale-out architecture and supports commodity hardware including direct-attached, network-attached, or cloud-attached, software-defined storage. We use an incremental-forever model to fetch only modified objects from the primary cluster. We are completely application-aware. For an application like Hadoop, we pull metadata information for databases and tables. The metadata includes database schemas, partition, data files, etc. Any recovery of the database will ensure that the original data files and metadata for the database is restored. We are also agentless. No Imanis Data software need be installed on any of the Hadoop nodes. The catalog is architected to host millions of versioned objects along with their attributes and properties. It is searchable with different attributes and regular expressions. In addition to backup/recovery, we also support cloud migration, test data management, data archival, and enhanced security and compliance. Please reach out with any questions to info@imanisdata.com. Imanis Data, Inc Zanker Road, Suite 109, San Jose CA imanisdata.com 2018 Imanis Data, Inc. All rights reserved. Imanis Data and the Imanis Data logo are trademarks of Imanis Data in the US and in other countries. Information subject to change without notice. All other trademarks and service marks are property of their respective owners.
THE COMPLETE GUIDE COUCHBASE BACKUP & RECOVERY
THE COMPLETE GUIDE COUCHBASE BACKUP & RECOVERY INTRODUCTION Driven by the need to remain competitive and differentiate themselves, organizations are undergoing digital transformations and becoming increasingly
More informationArchiving, Backup, and Recovery for Complete the Promise of Virtualisation Unified information management for enterprise Windows environments
Archiving, Backup, and Recovery for Complete the Promise of Virtualisation Unified information management for enterprise Windows environments The explosion of unstructured information It is estimated that
More informationRemove complexity in protecting your virtual infrastructure with. IBM Spectrum Protect Plus. Data availability made easy. Overview
Overview Challenge In your organization, backup management is too complex and consumes too much time and too many IT resources. Solution IBM Spectrum Protect Plus dramatically simplifies data protection
More informationYour Complete Guide to Backup and Recovery for MongoDB
Your Complete Guide to Backup and Recovery for MongoDB EBOOK Your Complete Guide to Backup and Recovery for MongoDB Table of Contents Part I: Backup and Recovery for MongoDB Part II: Customer Case Study
More informationMAPR TECHNOLOGIES, INC. TECHNICAL BRIEF APRIL 2017 MAPR SNAPSHOTS
MAPR TECHNOLOGIES, INC. TECHNICAL BRIEF APRIL 2017 MAPR SNAPSHOTS INTRODUCTION The ability to create and manage snapshots is an essential feature expected from enterprise-grade storage systems. This capability
More informationTOP REASONS TO CHOOSE DELL EMC OVER VEEAM
HANDOUT TOP REASONS TO CHOOSE DELL EMC OVER VEEAM 10 This handout overviews the top ten reasons why customers choose Data Protection from Dell EMC over Veeam. Dell EMC has the most comprehensive data protection
More informationProtecting Mission-Critical Application Environments The Top 5 Challenges and Solutions for Backup and Recovery
White Paper Business Continuity Protecting Mission-Critical Application Environments The Top 5 Challenges and Solutions for Backup and Recovery Table of Contents Executive Summary... 1 Key Facts About
More informationCommvault Backup to Cloudian Hyperstore CONFIGURATION GUIDE TO USE HYPERSTORE AS A STORAGE LIBRARY
Commvault Backup to Cloudian Hyperstore CONFIGURATION GUIDE TO USE HYPERSTORE AS A STORAGE LIBRARY CONTENTS EXECUTIVE SUMMARY... 2 SOLUTION OVERVIEW... 3 USE CASES... 4 SOLUTION COMPONENTS... 5 Commvault
More informationUnderstanding Virtual System Data Protection
Understanding Virtual System Data Protection Server virtualization is the most important new technology introduced in the data center in the past decade. It has changed the way we think about computing
More informationVeeam Availability Solution for Cisco UCS: Designed for Virtualized Environments. Solution Overview Cisco Public
Veeam Availability Solution for Cisco UCS: Designed for Virtualized Environments Veeam Availability Solution for Cisco UCS: Designed for Virtualized Environments 1 2017 2017 Cisco Cisco and/or and/or its
More informationNEXT BIG THING. Edgemo Summit Martin Plesner-Jacobsen Team Lead Nordic
NEXT BIG THING Edgemo Summit 2016 Martin Plesner-Jacobsen Team Lead Nordic HQ Baar, Switzerland Founded in 2006, Veeam currently has 205,000 customers 41,000 ProPartners 2,200 employees worldwide 205,000+
More informationChapter 1. Storage Concepts. CommVault Concepts & Design Strategies: https://www.createspace.com/
Chapter 1 Storage Concepts 4 - Storage Concepts In order to understand CommVault concepts regarding storage management we need to understand how and why we protect data, traditional backup methods, and
More informationCONFIGURATION GUIDE WHITE PAPER JULY ActiveScale. Family Configuration Guide
WHITE PAPER JULY 2018 ActiveScale Family Configuration Guide Introduction The world is awash in a sea of data. Unstructured data from our mobile devices, emails, social media, clickstreams, log files,
More informationScalable backup and recovery for modern applications and NoSQL databases. Best practices for cloud-native applications and NoSQL databases on AWS
Scalable backup and recovery for modern applications and NoSQL databases Best practices for cloud-native applications and NoSQL databases on AWS NoSQL databases running on the cloud need a cloud-native
More informationData Protection for Virtualized Environments
Technology Insight Paper Data Protection for Virtualized Environments IBM Spectrum Protect Plus Delivers a Modern Approach By Steve Scully, Sr. Analyst February 2018 Modern Data Protection for Virtualized
More informationVMware vsphere Data Protection 5.8 TECHNICAL OVERVIEW REVISED AUGUST 2014
VMware vsphere Data Protection 5.8 TECHNICAL OVERVIEW REVISED AUGUST 2014 Table of Contents Introduction.... 3 Features and Benefits of vsphere Data Protection... 3 Additional Features and Benefits of
More informationTop Trends in DBMS & DW
Oracle Top Trends in DBMS & DW Noel Yuhanna Principal Analyst Forrester Research Trend #1: Proliferation of data Data doubles every 18-24 months for critical Apps, for some its every 6 months Terabyte
More informationA BigData Tour HDFS, Ceph and MapReduce
A BigData Tour HDFS, Ceph and MapReduce These slides are possible thanks to these sources Jonathan Drusi - SCInet Toronto Hadoop Tutorial, Amir Payberah - Course in Data Intensive Computing SICS; Yahoo!
More informationThe Definitive Guide to MongoDB Backup and Recovery
The Definitive Guide to MongoDB Backup and Recovery EBOOK The Definitive Guide to MongoDB Backup and Recovery Table of Contents Executive Summary 1. MongoDB Technology Overview 2. The Need for Backup &
More informationIBM Spectrum Protect Plus
IBM Spectrum Protect Plus Simplify data recovery and data reuse for VMs, files, databases and applications Highlights Achieve rapid VM, file, database, and application recovery Protect industry-leading
More informationTintri Cloud Connector
TECHNICAL WHITE PAPER Tintri Cloud Connector Technology Primer & Deployment Guide www.tintri.com Revision History Version Date Description Author 1.0 12/15/2017 Initial Release Bill Roth Table 1 - Revision
More informationDaily, Weekly or Monthly Partitions? A discussion of several factors for this important decision
Daily, Weekly or Monthly Partitions? A discussion of several factors for this important decision Copyright 2006 Mercury Consulting Published in July 2006 Conventions The following typographical conventions
More informationThe Definitive Guide to Backup and Recovery for Cassandra
The Definitive Guide to Backup and Recovery for Cassandra EBOOK The Definitive Guide to Backup and Recovery for Cassandra Table of Contents Executive Summary 1. Cassandra Technology Overview 2. The Need
More informationSolution Brief: Commvault HyperScale Software
Solution Brief: Commvault HyperScale Software ENTERPRISE IT SHIFTS Enterprise IT is being transformed with the maturing of public cloud providers that offer compute, storage and application services with
More informationSECURE CLOUD BACKUP AND RECOVERY
SECURE CLOUD BACKUP AND RECOVERY Learn more about how KeepItSafe can help to reduce costs, save time, and provide compliance for online backup, disaster recovery-as-a-service, mobile data protection, and
More informationHDFS Architecture. Gregory Kesden, CSE-291 (Storage Systems) Fall 2017
HDFS Architecture Gregory Kesden, CSE-291 (Storage Systems) Fall 2017 Based Upon: http://hadoop.apache.org/docs/r3.0.0-alpha1/hadoopproject-dist/hadoop-hdfs/hdfsdesign.html Assumptions At scale, hardware
More informationREFERENCE ARCHITECTURE Quantum StorNext and Cloudian HyperStore
REFERENCE ARCHITECTURE Quantum StorNext and Cloudian HyperStore CLOUDIAN + QUANTUM REFERENCE ARCHITECTURE 1 Table of Contents Introduction to Quantum StorNext 3 Introduction to Cloudian HyperStore 3 Audience
More informationActive Archive and the State of the Industry
Active Archive and the State of the Industry Taking Data Archiving to the Next Level Abstract This report describes the state of the active archive market. New Applications Fuel Digital Archive Market
More informationINFINIDAT Data Protection. White Paper
INFINIDAT Data Protection White Paper Abstract As data has taken on the role of being the lifeblood of business, protecting that data is the most important task IT has in the datacenter today. Data protection
More informationEight Tips for Better Archives. Eight Ways Cloudian Object Storage Benefits Archiving with Veritas Enterprise Vault
Eight Tips for Better Email Archives Eight Ways Cloudian Object Storage Benefits Email Archiving with Veritas Enterprise Vault Most organizations now manage terabytes, if not petabytes, of corporate and
More informationHadoop and HDFS Overview. Madhu Ankam
Hadoop and HDFS Overview Madhu Ankam Why Hadoop We are gathering more data than ever Examples of data : Server logs Web logs Financial transactions Analytics Emails and text messages Social media like
More informationDATA PROTECTION SOLUTION MICROSOFT SQL SERVER
DATA PROTECTION SOLUTION MICROSOFT SQL SERVER For more information, refer to Reduxio Systems Inc. website at http://www.reduxio.com. If you have comments about this documentation, submit your feedback
More informationCloud Backup and Recovery for Healthcare and ecommerce
Get Your Cloud Backup On Cloud Backup and Recovery for Healthcare and ecommerce Peter Smails, Vice President, Marketing & Business Development Shalabh Goyal, Director, Product Management October 12 th,
More informationBoost your data protection with NetApp + Veeam. Schahin Golshani Technical Partner Enablement Manager, MENA
Boost your data protection with NetApp + Veeam Schahin Golshani Technical Partner Enablement Manager, MENA NetApp Product Strategy Market-leading innovations, that are NetApp Confidential Limited Use 3
More informationNEW Veeam Availability Suite 9.5 FULL integration with Microsoft 2016 Data Center Technologies. System Engineer, SAARC North
NEW Veeam Availability Suite 9.5 FULL integration with Microsoft 2016 Data Center Technologies Nirmal Puranik Hardeep Singh System Engineer, SAARC North Agenda About Veeam Veeam Global HQ Baar, Switzerland
More informationRedefine Data Protection: Next Generation Backup And Business Continuity
Redefine Data Protection: Next Generation Backup And Business Continuity 1 Business Is Being Redefined Leveraging the Power of Technology Megatrends CLOUD MOBILE SOCIAL BIG DATA 2 Creating New Next Gen
More informationTable of Contents... 2
5 Steps to Apache Cassandra Success with DataStax 1 2 4 3 5 Table of Contents Table of Contents... 2 Abstract... 3 Choosing the Right Database Technology... 3 Implementing a System on DataStax Enterprise...
More informationTitle DC Automation: It s a MARVEL!
Title DC Automation: It s a MARVEL! Name Nikos D. Anagnostatos Position Network Consultant, Network Solutions Division Classification ISO 27001: Public Data Center Evolution 2 Space Hellas - All Rights
More informationVirtual protection gets real
Virtual protection gets real How to protect virtual machines from downtime and data loss 5 must-have features for VM backup Businesses virtualize to consolidate resources, reduce costs and increase workforce
More informationVMware vsphere Data Protection Evaluation Guide REVISED APRIL 2015
VMware vsphere Data Protection REVISED APRIL 2015 Table of Contents Introduction.... 3 Features and Benefits of vsphere Data Protection... 3 Requirements.... 4 Evaluation Workflow... 5 Overview.... 5 Evaluation
More informationZero Data Loss Recovery Appliance DOAG Konferenz 2014, Nürnberg
Zero Data Loss Recovery Appliance Frank Schneede, Sebastian Solbach Systemberater, BU Database, Oracle Deutschland B.V. & Co. KG Safe Harbor Statement The following is intended to outline our general product
More informationData Protection Modernization: Meeting the Challenges of a Changing IT Landscape
Data Protection Modernization: Meeting the Challenges of a Changing IT Landscape Tom Clark IBM Distinguished Engineer, Chief Architect Software 1 Data growth is continuing to explode Sensors & Devices
More informationMarket Report. Scale-out 2.0: Simple, Scalable, Services- Oriented Storage. Scale-out Storage Meets the Enterprise. June 2010.
Market Report Scale-out 2.0: Simple, Scalable, Services- Oriented Storage Scale-out Storage Meets the Enterprise By Terri McClure June 2010 Market Report: Scale-out 2.0: Simple, Scalable, Services-Oriented
More informationIntroduction to K2View Fabric
Introduction to K2View Fabric 1 Introduction to K2View Fabric Overview In every industry, the amount of data being created and consumed on a daily basis is growing exponentially. Enterprises are struggling
More informationStorageCraft OneXafe and Veeam 9.5
TECHNICAL DEPLOYMENT GUIDE NOV 2018 StorageCraft OneXafe and Veeam 9.5 Expert Deployment Guide Overview StorageCraft, with its scale-out storage solution OneXafe, compliments Veeam to create a differentiated
More informationWhen, Where & Why to Use NoSQL?
When, Where & Why to Use NoSQL? 1 Big data is becoming a big challenge for enterprises. Many organizations have built environments for transactional data with Relational Database Management Systems (RDBMS),
More informationWHITE PAPER: ENTERPRISE SOLUTIONS. Disk-Based Data Protection Achieving Faster Backups and Restores and Reducing Backup Windows
WHITE PAPER: ENTERPRISE SOLUTIONS Disk-Based Data Protection Achieving Faster Backups and Restores and Reducing Backup Windows White Paper: Enterprise Security Disk-Based Data Protection Achieving Faster
More informationControlling Costs and Driving Agility in the Datacenter
Controlling Costs and Driving Agility in the Datacenter Optimizing Server Infrastructure with Microsoft System Center Microsoft Corporation Published: November 2007 Executive Summary To help control costs,
More informationMicrosoft SQL Server
Microsoft SQL Server Abstract This white paper outlines the best practices for Microsoft SQL Server Failover Cluster Instance data protection with Cohesity DataPlatform. December 2017 Table of Contents
More informationSymantec NetBackup 7 for VMware
V-Ray visibility into virtual machine protection Overview There s little question that server virtualization is the single biggest game-changing trend in IT today. Budget-strapped IT departments are racing
More informationVeritas NetBackup for Microsoft Exchange Server Administrator s Guide
Veritas NetBackup for Microsoft Exchange Server Administrator s Guide for Windows Release 8.1.1 Veritas NetBackup for Microsoft Exchange Server Administrator s Guide Last updated: 2018-02-16 Document version:netbackup
More informationThe vsphere 6.0 Advantages Over Hyper- V
The Advantages Over Hyper- V The most trusted and complete virtualization platform SDDC Competitive Marketing 2015 Q2 VMware.com/go/PartnerCompete 2015 VMware Inc. All rights reserved. v3b The Most Trusted
More informationDesigning Data Protection Strategies for Oracle Databases
WHITE PAPER Designing Data Protection Strategies for Oracle Databases VERITAS Backup Exec 9.1 for Windows Servers Agent for Oracle 11/20/2003 1 TABLE OF CONTENTS Introduction...3 Oracle Backup Basics...3
More informationToward Energy-efficient and Fault-tolerant Consistent Hashing based Data Store. Wei Xie TTU CS Department Seminar, 3/7/2017
Toward Energy-efficient and Fault-tolerant Consistent Hashing based Data Store Wei Xie TTU CS Department Seminar, 3/7/2017 1 Outline General introduction Study 1: Elastic Consistent Hashing based Store
More informationCLOUD-SCALE FILE SYSTEMS
Data Management in the Cloud CLOUD-SCALE FILE SYSTEMS 92 Google File System (GFS) Designing a file system for the Cloud design assumptions design choices Architecture GFS Master GFS Chunkservers GFS Clients
More informationTechnology Insight Series
EMC Avamar for NAS - Accelerating NDMP Backup Performance John Webster June, 2011 Technology Insight Series Evaluator Group Copyright 2011 Evaluator Group, Inc. All rights reserved. Page 1 of 7 Introduction/Executive
More informationHYCU and ExaGrid Hyper-converged Backup for Nutanix
HYCU and ExaGrid Hyper-converged Backup for Nutanix Backing Up and Recovering Data: Nutanix, ExaGrid and HYCU As IT data centers move to hyper-converged infrastructure, new and innovative backup approaches
More informationOracle Zero Data Loss Recovery Appliance (ZDLRA)
Oracle Zero Data Loss Recovery Appliance (ZDLRA) Overview Attila Mester Principal Sales Consultant Data Protection Copyright 2015, Oracle and/or its affiliates. All rights reserved. Safe Harbor Statement
More informationVirtualization. Disaster Recovery. A Foundation for Disaster Recovery in the Cloud
Technology Paper Disaster Acronym: DR The process, policies, and procedures that enable a business to recover data and systems after a disaster. A Foundation for Disaster in the Cloud Introduction Virtualization
More informationProtecting Microsoft Hyper-V 3.0 Environments with Arcserve
Protecting Microsoft Hyper-V 3.0 Environments with Arcserve Adding value to your Hyper-V environment. Today, you face demanding service level agreements (SLAs) while having to address staffing and budget
More informationHow to Protect SAP HANA Applications with the Data Protection Suite
White Paper Business Continuity How to Protect SAP HANA Applications with the Data Protection Suite As IT managers realize the benefits of in-memory database technology, they are accelerating their plans
More informationHOW TO AVOID STORAGE. Leveraging Flash Memory and Breakthrough Architecture to Accelerate Performance, Simplify Management, and Protect Your Data
HOW TO AVOID THE SINS OF STORAGE Leveraging Flash Memory and Breakthrough Architecture to Accelerate Performance, Simplify Management, and Protect Your Data NIMBLE STORAGE: PAGE 1 www.rdc.uk.com 1 S ome
More informationEvolved Backup and Recovery for the Enterprise
Evolved Backup and Recovery for the Enterprise with Asigra technology Working gives me confidence in my data protection plan. I know that if I ever need to restore, it will take a few minutes rather than
More informationHybrid Cloud NAS for On-Premise and In-Cloud File Services with Panzura and Google Cloud Storage
Panzura White Paper Hybrid Cloud NAS for On-Premise and In-Cloud File Services with Panzura and Google Cloud Storage By: Rich Weber, Product Management at Panzura This article describes how Panzura works
More informationWhat's New in vsan 6.2 First Published On: Last Updated On:
First Published On: 07-07-2016 Last Updated On: 08-23-2017 1 1. Introduction 1.1.Preface 1.2.Architecture Overview 2. Space Efficiency 2.1.Deduplication and Compression 2.2.RAID - 5/6 (Erasure Coding)
More informationWhite paper: Agentless Backup is Not a Myth. Agentless Backup is Not a Myth
White paper: less Backup is Not a Myth less Backup is Not a Myth White paper: less Backup is Not a Myth Executive Summary Backup and recovery software typically requires agents that are installed onto
More informationHPE 3PAR File Persona on HPE 3PAR StoreServ Storage with Veritas Enterprise Vault
HPE 3PAR File Persona on HPE 3PAR StoreServ Storage with Veritas Enterprise Vault Solution overview and best practices for data preservation with Veritas Enterprise Vault Technical white paper Technical
More informationUsing Computer Associates BrightStor ARCserve Backup with Microsoft Data Protection Manager
White Paper Using Computer Associates BrightStor ARCserve Backup with Microsoft Data Protection Manager Author(s): Computer Associates International and Microsoft Corporation Published September 2005 Abstract
More informationvsan Disaster Recovery November 19, 2017
November 19, 2017 1 Table of Contents 1. Disaster Recovery 1.1.Overview 1.2.vSAN Stretched Clusters and Site Recovery Manager 1.3.vSAN Performance 1.4.Summary 2 1. Disaster Recovery According to the United
More informationOracle NoSQL Database Overview Marie-Anne Neimat, VP Development
Oracle NoSQL Database Overview Marie-Anne Neimat, VP Development June14, 2012 1 Copyright 2012, Oracle and/or its affiliates. All rights Agenda Big Data Overview Oracle NoSQL Database Architecture Technical
More informationMicrosoft SQL Server HA and DR with DVX
Microsoft SQL Server HA and DR with DVX 385 Moffett Park Dr. Sunnyvale, CA 94089 844-478-8349 www.datrium.com Technical Report Introduction A Datrium DVX solution allows you to start small and scale out.
More informationHDFS Federation. Sanjay Radia Founder and Hortonworks. Page 1
HDFS Federation Sanjay Radia Founder and Architect @ Hortonworks Page 1 About Me Apache Hadoop Committer and Member of Hadoop PMC Architect of core-hadoop @ Yahoo - Focusing on HDFS, MapReduce scheduler,
More informationProtecting Microsoft Exchange
TECHNICAL WHITE PAPER: BACKUP EXEC TM 2014 PROTECTING MICROSOFT EXCHANGE Backup Exec TM 2014 Technical White Paper Protecting Microsoft Exchange Technical White Papers are designed to introduce Symantec
More informationProtecting Microsoft SharePoint
TECHNICAL WHITE PAPER: BACKUP EXEC TM 2014 PROTECTING MICROSOFT SHAREPOINT Backup Exec TM 2014 Technical White Paper Protecting Microsoft SharePoint Technical White Papers are designed to introduce Symantec
More informationThe Microsoft Large Mailbox Vision
WHITE PAPER The Microsoft Large Mailbox Vision Giving users large mailboxes without breaking your budget Introduction Giving your users the ability to store more email has many advantages. Large mailboxes
More informationMicrosoft E xchange 2010 on VMware
: Microsoft E xchange 2010 on VMware Availability and R ecovery Options This product is protected by U.S. and international copyright and intellectual property laws. This product is covered by one or more
More informationTivoli Storage Manager for Virtual Environments: Data Protection for VMware Solution Design Considerations IBM Redbooks Solution Guide
Tivoli Storage Manager for Virtual Environments: Data Protection for VMware Solution Design Considerations IBM Redbooks Solution Guide IBM Tivoli Storage Manager for Virtual Environments (referred to as
More informationXtremIO Business Continuity & Disaster Recovery. Aharon Blitzer & Marco Abela XtremIO Product Management
XtremIO Business Continuity & Disaster Recovery Aharon Blitzer & Marco Abela XtremIO Product Management Agenda XtremIO Current BC/DR Offerings New BC/DR Offering Benefits of New Offering Technical Overview
More information5 Fundamental Strategies for Building a Data-centered Data Center
5 Fundamental Strategies for Building a Data-centered Data Center June 3, 2014 Ken Krupa, Chief Field Architect Gary Vidal, Solutions Specialist Last generation Reference Data Unstructured OLTP Warehouse
More informationMAXIMIZE YOUR NUTANIX ROI WITH SURELINE SUREedge
SOLUTIONS BRIEF MAXIMIZE YOUR NUTANIX ROI WITH SURELINE SUREedge SUREedge delivers compelling value to Nutanix users with Migration and DR solutions AT A GLANCE Nutanix delivers an enterprise cloud platform
More informationDesigning Data Protection Strategies for Oracle Databases
WHITE PAPER Designing Data Protection Strategies for Oracle Databases VERITAS Backup Exec 9.0 for Windows Servers Agent for Oracle VERSION INCLUDES TABLE OF CONTENTS STYLES 1 TABLE OF CONTENTS Introduction...3
More informationSymantec Reference Architecture for Business Critical Virtualization
Symantec Reference Architecture for Business Critical Virtualization David Troutt Senior Principal Program Manager 11/6/2012 Symantec Reference Architecture 1 Mission Critical Applications Virtualization
More informationCisco Cloud Services Router 1000V and Amazon Web Services CASE STUDY
Cisco Cloud Services Router 1000V and Amazon Web Services CASE STUDY CASE STUDY ADOBE 2 About Adobe Adobe Systems provides digital media and marketing solutions to customers around the world including
More informationMigrating NetBackUp Data to the Commvault Data Platform
Migrating NetBackUp Data to the Commvault Data Platform LEGACY MIGRATION OVERVIEW Legacy backup data migrations are typically perceived to be high-cost, take a long time to complete, and prone to error
More informationVMware vsphere 4 and Cisco Nexus 1000V Series: Accelerate Data Center Virtualization
VMware vsphere 4 and Cisco Nexus 1000V Series: Accelerate Data Center Virtualization Executive Summary VMware for the past decade has been the thought leader in driving virtualization of the data center
More informationCloud Computing and Hadoop Distributed File System. UCSB CS170, Spring 2018
Cloud Computing and Hadoop Distributed File System UCSB CS70, Spring 08 Cluster Computing Motivations Large-scale data processing on clusters Scan 000 TB on node @ 00 MB/s = days Scan on 000-node cluster
More informationHigh Availability and Disaster Recovery Solutions for Perforce
High Availability and Disaster Recovery Solutions for Perforce This paper provides strategies for achieving high Perforce server availability and minimizing data loss in the event of a disaster. Perforce
More informationIntroducing RecoverX 2.5
Backup & Recovery for Modern Applications Introducing RecoverX 2.5 Shalabh Goyal, Director, Product Management Kedar Hiremath, Product Marketing Manager November 16 th, 2017 What We Will Cover Today What
More informationHow To Guide: Long Term Archive for Rubrik. Using SwiftStack Storage as a Long Term Archive for Rubrik
Using SwiftStack Storage as a Long Term Archive for Rubrik Introduction 3 Solution Architecture 5 Example Design 5 Multi Region Cluster 6 Network Design 6 Minimum Supported Versions and Solution Limits
More informationExecutive Summary SOLE SOURCE JUSTIFICATION. Microsoft Integration
Executive Summary Commvault Simpana software delivers the unparalleled advantages and benefits of a truly holistic approach to data management. It is one product that contains individually licensable modules
More informationIBM Data Replication for Big Data
IBM Data Replication for Big Data Highlights Stream changes in realtime in Hadoop or Kafka data lakes or hubs Provide agility to data in data warehouses and data lakes Achieve minimum impact on source
More informationEMC Data Protection for Microsoft
EMC Data Protection for Microsoft Featuring Industry Perspectives from IDC 7 November 2013 Ashish Nadkarni, IDC Research Director, Storage Systems @Ashish_Nadkarni Phil George, EMC Backup Recovery Systems
More informationReal-time Protection for Microsoft Hyper-V
Real-time Protection for Microsoft Hyper-V Introduction Computer virtualization has come a long way in a very short time, triggered primarily by the rapid rate of customer adoption. Moving resources to
More informationChapter 2 CommVault Data Management Concepts
Chapter 2 CommVault Data Management Concepts 10 - CommVault Data Management Concepts The Simpana product suite offers a wide range of features and options to provide great flexibility in configuring and
More informationRedefine Data Protection: Next Generation Backup & Business Continuity Solutions
Redefine Data Protection: Next Generation Backup & Business Continuity Solutions 1 Creating New Next Gen Applications Existing Workloads Continue to Grow 2 How Can Data Protection Help? Lower Cost Reduce
More informationUpgrade Your MuleESB with Solace s Messaging Infrastructure
The era of ubiquitous connectivity is upon us. The amount of data most modern enterprises must collect, process and distribute is exploding as a result of real-time process flows, big data, ubiquitous
More informationChapter 11. SnapProtect Technology
Chapter 11 SnapProtect Technology Hardware based snapshot technology provides the ability to use optimized hardware and disk appliances to snap data on disk arrays providing quick recovery by reverting
More informationAt-Scale Data Centers & Demand for New Architectures
Allen Samuels At-Scale Data Centers & Demand for New Architectures Software Architect, Software and Systems Solutions June 4, 2015 1 Forward-Looking Statements During our meeting today we may make forward-looking
More informationProtecting VMware vsphere/esx Environments with CA ARCserve
Solution Brief: CA ARCserve R16.5 Complexity ate my budget Protecting VMware vsphere/esx Environments with CA ARCserve Customer Challenges Today, you face demanding service level agreements (SLAs) while
More informationChapter 10 Protecting Virtual Environments
Chapter 10 Protecting Virtual Environments 164 - Protecting Virtual Environments As more datacenters move to virtualize their environments and the number of virtual machines and the physical hosts they
More information