Trends in Data Protection CDP and VTL

Similar documents
Trends in Data Protection and Restoration Technologies. Jason Iehl, Network Appliance Michael Rowan, Consultant

Trends in Data Protection and Restoration Technologies. Jason Iehl, NetApp

Trends in Data Protection and Restoration Technologies. Mike Fishman, EMC 2 Corporation

Restoration Technologies

Disk and Tape Backup Mechanisms

ADVANCED DEDUPLICATION CONCEPTS. Thomas Rivera, BlueArc Gene Nagle, Exar

Data Deduplication Methods for Achieving Data Efficiency

ADVANCED DATA REDUCTION CONCEPTS

Continuous Data Protection Solving the Problem of Restoration June, 2008

A Crash Course In Wide Area Data Replication. Jacob Farmer, CTO, Cambridge Computer

IBM Storage Software Strategy

50 TB. Traditional Storage + Data Protection Architecture. StorSimple Cloud-integrated Storage. Traditional CapEx: $375K Support: $75K per Year

Tom Sas HP. Author: SNIA - Data Protection & Capacity Optimization (DPCO) Committee

The Nuances of Backup and Recovery Solutions

Disk-to-Disk backup. customer experience. Harald Burose. Architect Hewlett-Packard

HYCU and ExaGrid Hyper-converged Backup for Nutanix

Farid SAADI. Senior Systems Engineer, Backup Recovery Systems

arcserve r16.5 Hybrid data protection

Chapter 1. Storage Concepts. CommVault Concepts & Design Strategies:

Copyright 2010 EMC Corporation. Do not Copy - All Rights Reserved.

Identifying and Eliminating Backup System Bottlenecks: Taking Your Existing Backup System to the Next Level

1 Quantum Corporation 1

De-dupe: It s not a question of if, rather where and when! What to Look for and What to Avoid

Agenda Secondary Storage Problem Cohesity Hyperconverged Secondary Storage Demo: Cohesity and Vmware vilogics Use Case

STORAGE CONSOLIDATION WITH IP STORAGE. David Dale, NetApp

By William Ng Senior IT Specialist

How Symantec Backup solution helps you to recover from disasters?

STORAGE CONSOLIDATION WITH IP STORAGE. David Dale, NetApp

Dell DR4000 Replication Overview

Backups and archives: What s the scoop?

The storage challenges of virtualized environments

WAN Application Infrastructure Fueling Storage Networks

HPE Converged Data Solutions

Balakrishnan Nair. Senior Technology Consultant Back Up & Recovery Systems South Gulf. Copyright 2011 EMC Corporation. All rights reserved.

Chapter 11. SnapProtect Technology

Simplify and Improve IMS Administration by Leveraging Your Storage System

Copyright 2012 EMC Corporation. All rights reserved.

Veeam Availability Solution for Cisco UCS: Designed for Virtualized Environments. Solution Overview Cisco Public

Simplify and Improve DB2 Administration by Leveraging Your Storage System

Reasons to Deploy Oracle on EMC Symmetrix VMAX

Protecting Mission-Critical Application Environments The Top 5 Challenges and Solutions for Backup and Recovery

Archiving, Backup, and Recovery for Complete the Promise of Virtualisation Unified information management for enterprise Windows environments

Chapter 10 Protecting Virtual Environments

Preserving the World s Most Important Data. Yours. SYSTEMS AT-A-GLANCE: KEY FEATURES AND BENEFITS

HP D2D & STOREONCE OVERVIEW

Complete Data Protection & Disaster Recovery Solution

The 5 Keys to Virtual Backup Excellence

Scale-out Data Deduplication Architecture

Application Recovery. Andreas Schwegmann / HP

Protect enterprise data, achieve long-term data retention

Integrated Data Protection

TSM Paper Replicating TSM

THE FOUR STEPS TO A TAPELESS BACKUP ENVIRONMENT: YOUR HOW-TO GUIDE FOR DATA MANAGEMENT SUCCESS INTRODUCTION

ECONOMICAL, STORAGE PURPOSE-BUILT FOR THE EMERGING DATA CENTERS. By George Crump

Backup and archiving need not to create headaches new pain relievers are around

Using Self-Protecting Storage to Lower Backup TCO

DAHA AKILLI BĐR DÜNYA ĐÇĐN BĐLGĐ ALTYAPILARIMIZI DEĞĐŞTĐRECEĞĐZ

Verron Martina vspecialist. Copyright 2012 EMC Corporation. All rights reserved.

Netapp Exam NS0-510 NCIE-Backup & Recovery Implementation Engineer Exam Version: 7.0 [ Total Questions: 216 ]

EMC DATA DOMAIN OPERATING SYSTEM

A Centralized Data Protection Application for Cross Vendor Storage Systems Prateek Sinha & Nishi Gupta Tata Consultancy Services

Wong Tze Chuan General Manager. Gadget Wearable Tech (M) Sdn Bhd

WHITE PAPER: DATA PROTECTION. Veritas NetBackup for Microsoft Exchange Server Solutions Guide. Larry Cadloff February 2009

Simplify and Improve IMS Administration by Leveraging Your Storage System

IBM Spectrum Protect Version Introduction to Data Protection Solutions IBM

Vendor: IBM. Exam Code: C Exam Name: Fundamentals of Applying Tivoli Storage Solutions V3. Version: Demo

PROTECT YOUR DATA, SAFEGUARD YOUR BUSINESS

Data Protection. Rethinking. Michael Andrews, Director, Enterprise Data Protection, APJ HP Autonomy IM

Virtualization with Arcserve Unified Data Protection

Midsize Enterprise Solutions Selling Guide. Sell NetApp s midsize enterprise solutions and take your business and your customers further, faster

Business Resiliency in the Cloud: Reality or Hype?

Boost your data protection with NetApp + Veeam. Schahin Golshani Technical Partner Enablement Manager, MENA

IBM SmartCloud Resilience offers cloud-based services to support a more rapid, reliable and cost-effective enterprise-wide resiliency.

Moving From Reactive to Proactive Storage Management with an On-demand Cloud Solution

Next Generation Data Protection and Recovery Solution. Den Ng

Using Computer Associates BrightStor ARCserve Backup with Microsoft Data Protection Manager

Redefine Data Protection: Next Generation Backup & Business Continuity Solutions

Copyright 2012 EMC Corporation. All rights reserved.

Nutanix Tech Note. Virtualizing Microsoft Applications on Web-Scale Infrastructure

University Information Technology Data Backup and Recovery Policy

Next Generation Backup: Better ways to deal with rapid data growth and aging tape infrastructures

Combining HP StoreOnce and HP StoreEver Tape

Symantec Backup Exec Blueprints

Veeam and HP: Meet your backup data protection goals

Maximizing Availability With Hyper-Converged Infrastructure

Redefine Data Protection: Next Generation Backup And Business Continuity

MOVING TOWARDS ZERO DOWNTIME FOR WINTEL Caddy Tan 21 September Leaders Have Vision visionsolutions.com 1

Welcome! IT Executive Sagamore Spirit

Continuous data protection. PowerVault DL Backup to Disk Appliance

Protecting your Virtualized Server Investment

Transforming Data Protection with HPE: A Unified Backup and Recovery June 16, Copyright 2016 Vivit Worldwide

The Need for a Terminology Bridge. May 2009

EMC ACADEMIC ALLIANCE

EMC NetWorker Backup Solution for SAP HANA. Data Protection for Big Data

The Data Protection Rule and Hybrid Cloud Backup

Controlling Costs and Driving Agility in the Datacenter

Storage Management for a New Economy

Hyper-converged Secondary Storage for Backup with Deduplication Q & A. The impact of data deduplication on the backup process

Arcserve Solutions for Amazon Web Services (AWS)

How to solve your backup problems with HP StoreOnce

Transcription:

Trends in Data Protection CDP and VTL Agnes Lamont, TimeSpring Jason Iehl, Network Appliance

SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individuals may use this material in presentations and literature under the following conditions: Any slide or slides used must be reproduced without modification The SNIA must be acknowledged as source of any material used in the body of any document containing material from these presentations. This presentation is a project of the SNIA Education Committee. 2

About SNIA and the DMF About the Storage Networking Industry Association (SNIA) SNIA s primary goal is to ensure that storage networks become complete and trusted solutions across the IT community For additional information about SNIA see www.snia.org SNIA s Dictionary of Storage Networking Terminology is online at www.snia.org/dictionary About the SNIA Data Management Forum (DMF) www.snia-dmf.org The DMF is a sub-group of SNIA acting as the worldwide authority on Data Management, Data Protection and ILM The DMF is a collaborative storage industry resource available to anyone responsible for the accessibility and integrity of their organization s information. Data Protection Initiative (DPI) Defining new approaches and best practices for data protection and recovery DMF Information Lifecycle Management Initiative (ILMI) Developing, teaching and promoting ILM practices, implementation methods, and benefits Long term Archive and Compliance Storage Initiative (LTACSI) Addressing challenges in developing, securing, and retaining long-term digital archives 3

Abstract Trends in Data Protection CDP and VTL Data protection is evolving beyond traditional backup, snapshots and replication. CDP and VTL are rapidly emerging as key data protection technologies. This session will provide an overview of Continuous Data Protection (CDP) and Virtual Tape Libraries (VTL). This tutorial will examine how CDP and VTL address common data protection concerns, including backup windows and data recovery. The session will provide clarity on what CDP and VTL are and are not and what can realistically be achieved with these technologies. It will offer practical guidance on how CDP and VTL technologies can be introduced into the IT environment in a way that minimizes disruption and simplifies ongoing management, thereby reducing complexity and costs. 4

Outline Traditional data protection challenges Introduction to VTL Introduction to CDP Challenges addressed by VTL and CDP Evolving data protection SNIA resources 5

Traditional Data Protection Challenges Backup window Failed, inconsistent, unreliable recovery Recovery time too long (poor RTO) Negative production impact Protection gaps (poor RPO) Disaster recovery Regulatory compliance and corporate governance Costly and inefficient Disruptive to change 6

Protection Based on Recovery Years Days Hrs Mins Secs Secs Mins Hrs Days Recovery Point Recovery Time Protection Methods Recovery Methods Tape Backups Vaults Archival Capture on Write Disk Backups Snapshots Synthetic Backup Real Time Replication Instant Recovery Disk Restores Tape Restores Point-in-Time Roll Back Search & Retrieve Enabling Technologies Tape & Automation Virtual Tape Library Deduplication Continuous Data Protection Archive Store 7

VTL Defined Virtual Tape Library (VTL) is made up of a couple definitions virtual device CONTEXT [Storage System] A device presented to an operating environment by control software or by a volume manager. From an application standpoint, a virtual device is equivalent to a physical one. In some implementations, virtual devices may differ from physical ones at the operating system level virtual tape CONTEXT [Storage System] A virtual device with the characteristics of a tape. SNIA dictionary definitions 8

Introduction to VTL What: Originally designed for mainframe Moved into open systems market Fits within the backup environment Easy to deploy and integrate Takes advantage of current processes Reduces tape media handling IP / FC SAN VTL Backup Server Why: Improved speed and reliability Speed of higher end tape without the downside Ability to achieve high performance with or without the use of multiplexing Enables faster access to data for single file/folder restores No detached tape leaders or mechanical failures Tape Library 9

The VTL Difference Easy to manage in traditional backup software environment: Works like normal tape library Fits into existing backup and restore processes Viewed as open systems cartridges, robot, tape drives, and in some cases even a mail slot Standard tape copy, cloning, or vaulting functions apply for off-site copies Used to replicate data to physical tape for long term retention Cost effective solution Leverages lower cost disk Can extend the life of current physical tape investment Used as a front-end to the backup process Tape is still used for longer term retention 10

VTL Deployment Scenario 1 Scenario 2 Backup Server Backup Server VTL VTL IP / FC SAN IP / FC SAN Tape Library Tape Library Backup Media Servers Backup Media Servers 11

VTL Best Practices Use as primary backup target to reduce backup window Still take advantage of tape as backup target where appropriate Build out to enable addition quick restores Single file, folder, and/or volume Rules the same rules for libraries and tape when physically connecting Virtual Drives per connection Tape redeployment Eject process, controlled by the backup software Offsite requirements Bandwidth, connectivity, time to complete tape copies 12

VTL Investment Payback Physical tape media management Mission and business critical data Increased retention periods Customers Report Back Average Payback Period Average Satisfaction Backup and Restore Reliability Average Backup Speed Increase Average Restore Speed Increase 12 months 9 out of 10 100% Improvement 200% 400% 13

CDP Defined Continuous Data Protection (CDP) is a methodology that continuously captures or tracks data modifications and stores changes independent of the primary data, enabling recovery points from any point in the past. CDP systems may be block-, file- or application-based and can provide fine granularities of restorable objects to infinitely variable recovery points. SNIA DMF DPI/CDP SIG definition 14

Introduction to CDP What: Capture every change as it occurs Protected copy in a secondary location Recover to any point in time How: Block-based File-based Application-based Why: Implementations of true CDP today are delivering zero data loss, zero backup window and simple recovery. CDP customers can protect all data at all times and recover directly to any point in time. 15

The CDP Difference Replication is not CDP: Maintains only a current copy of the data May be combined with some snapshot capabilities Snapshots are not CDP: Snapshots are scheduled events Data loss possible if crash or corruption happens between snaps Snapshots frequently to same system as primary Lack continuous index with embedded knowledge of relationship of data to files, folders, application and server Scheduled events are not CDP: Scheduled backup processes Log collection for database style applications, rolling transactions forwards or backwards 16

Traditional Recovery Last Known- Good Image Analyze APPLICATION DOWNTIME Application Restarted Modifications Since Last Image Analyze Restore* Recover Recovery Point Objective Drives *10TB = 4 hours from disk, 12.5 hours from tape Recovery Time Objective 17

CDP Buyers Guide Storage Networking Industry Association Recovery with CDP APPLICATION DOWNTIME Application Restarted Analyze Recover Offers a Closer Recovery Point Instant Restore...and a Shorter Recovery Time 18

CDP Deployment DATABASE SERVER SERVERS MAY BE CLUSTERED EMAIL SERVER REPOSITORY AND/OR REMOTE REPOSITORY APPLICATION SERVER 19

CDP Implementation Models Database Database Server Applications NTFS Network Server NFS, CIFS Files Virtual Blocks Application-based File-based Volume Manager Logical Blocks Device Driver Storage Network Block-based 20

Consistency Logical Coherence In electronic data management, a set of data is said to be consistent when the data can be correctly and unambiguously interpreted by an application. Data Consistency is THE critical issue in data recovery 21

Event delays in stack 22

Of Growing Importance The Traditional Data Protection Process required closing files to create data consistency Data Growth This process causes a lot of pain As service levels for restore become more demanding, the problem gets unmanageable Restore Time Service Level Performance 23

CDP 4 Phase Operational Summary 1. Installation - classify and group application data 2. Operation - continuously captures data changes 3. Retention validates, retains and manages data in repository 4. Access view and retrieve as needed 24

CDP Best Practices Classify data and ILM policies Content grouping, retention Consistency System-level, transaction, crash etc. Assess storage requirements volume of data, change rates Include opportunity in TCO modeling Tape redeployment Offsite requirements Bandwidth, connectivity, cache tuning Understand versions available Data leverage beyond protection Backward and forward data manipulation 25

Challenges Revisited Backup window Failed, inconsistent, unreliable recovery Recovery time too long (poor RTO) Negative production impact Protection gaps (poor RPO) Disaster recovery Regulatory compliance and corporate governance Costly and inefficient Disruptive to change 26

Evolving the Data Protection Infrastructure Investment protection No forklift upgrades No lock in open mind Right technology for the right problem Evolutionary approach What s ahead? 27

Solving the problem Desktops / Clients CDP Repository Application / Database Servers IP Network IP / FC SAN VTL Email / File Servers Backup Media Servers Tape Library 28

SNIA Resources Related tutorials Disk and Tape Backup Mechanisms Disk Based Restoration Technology Visit the Data Management Forum website at http://www.snia-dmf.org Data Protection Buyers Guide available 29

Q&A / Feedback Please send any questions or comments on this presentation to SNIA: trackdatamgmt@snia.org Many thanks to the following individuals for their contributions to this tutorial: Agnes Lamont, TimeSpring Shane Jackson, Quantum Jason Iehl, Network Appliance Dr. Rick Carlson, TimeSpring Get Involved! www.snia-dmf.org - Find a passion - Join a committee - Gain knowledge & influence - Make a difference 30