ECE Engineering Robust Server Software. Spring 2018

Similar documents
ECE Enterprise Storage Architecture. Fall 2018

Information Storage and Management TM Volume 2 of 2 Student Guide. EMC Education Services

Chapter 12 Backup and Recovery

Business Continuity and Disaster Recovery. Ed Crowley Ch 12

HP Designing and Implementing HP Enterprise Backup Solutions. Download Full Version :

Copyright 2012 EMC Corporation. All rights reserved.

EMC RecoverPoint. EMC RecoverPoint Support

Disaster Recovery Is A Business Strategy

Chapter 10 Protecting Virtual Environments

Module 4 STORAGE NETWORK BACKUP & RECOVERY

High Availability- Disaster Recovery 101

Chapter 11. SnapProtect Technology

New England Data Camp v2.0 It is all about the data! Caregroup Healthcare System. Ayad Shammout Lead Technical DBA

BUSINESS CONTINUITY: THE PROFIT SCENARIO

Understanding Virtual System Data Protection

High Availability- Disaster Recovery 101

Copyright 2012 EMC Corporation. All rights reserved.


Continuous data protection. PowerVault DL Backup to Disk Appliance

Netapp Exam NS0-510 NCIE-Backup & Recovery Implementation Engineer Exam Version: 7.0 [ Total Questions: 216 ]

Disaster Recovery-to-the- Cloud Best Practices

DISASTER RECOVERY (DR): SOMETHING EVERYBODY NEEDS, BUT NEVER WANTS TO USE

High Availability & Disaster Recovery. Witt Mathot

High Availability through Warm-Standby Support in Sybase Replication Server A Whitepaper from Sybase, Inc.

Achieving Rapid Data Recovery for IBM AIX Environments An Executive Overview of EchoStream for AIX

Trends in Data Protection and Restoration Technologies. Mike Fishman, EMC 2 Corporation

Disaster Recovery Solution Achieved by EXPRESSCLUSTER

SharePoint Cincy 2011

VERITAS Volume Replicator. Successful Replication and Disaster Recovery

Simplify Backups. Dell PowerVault DL2000 Family

Copyright 2010 EMC Corporation. Do not Copy - All Rights Reserved.

Saving SharePoint Admin 100 (Sponsor) Sean McDonough Idera

Chapter 11: File System Implementation. Objectives

Disaster Recovery and Business Continuity

Disaster Recovery Options

MOVING TOWARDS ZERO DOWNTIME FOR WINTEL Caddy Tan 21 September Leaders Have Vision visionsolutions.com 1

Veritas Storage Foundation for Windows by Symantec

Microsoft SQL Server

BC/DR Strategy with VMware

Computer (In)Security 2: Computer System Backup and Recovery. Principal, McDowall Consulting, 73 Murray Avenue, Bromley, Kent BR1 3DJ, UK

Using Computer Associates BrightStor ARCserve Backup with Microsoft Data Protection Manager

RecoverPoint Operations

RealTime. RealTime. Real risks. Data recovery now possible in minutes, not hours or days. A Vyant Technologies Product. Situation Analysis

Protecting Mission-Critical Application Environments The Top 5 Challenges and Solutions for Backup and Recovery

Symantec Design of DP Solutions for UNIX using NBU 5.0. Download Full Version :

How to license Oracle Database programs in DR environments

InterSystems High Availability Solutions

When failure is not an option HP NonStop BackBox VTC

INTRODUCING VERITAS BACKUP EXEC SUITE

Backups and archives: What s the scoop?

EMC Data Domain for Archiving Are You Kidding?

Veritas Storage Foundation for Windows by Symantec

Disaster Recovery Solutions for Oracle Database Standard Edition RAC. A Dbvisit White Paper By Anton Els

Disk-to-Disk backup. customer experience. Harald Burose. Architect Hewlett-Packard

SAP HANA. HA and DR Guide. Issue 03 Date HUAWEI TECHNOLOGIES CO., LTD.

Hyper-converged Secondary Storage for Backup with Deduplication Q & A. The impact of data deduplication on the backup process

ZYNSTRA TECHNICAL BRIEFING NOTE

Controlling Costs and Driving Agility in the Datacenter

A Crash Course In Wide Area Data Replication. Jacob Farmer, CTO, Cambridge Computer

Replication is the process of creating an

Next Generation Data Protection and Recovery Solution. Den Ng

Configuration Guide for Veeam Backup & Replication with the HPE Hyper Converged 250 System

Outline. Failure Types

The Nuances of Backup and Recovery Solutions

Exploring Options for Virtualized Disaster Recovery

AlwaysOn Availability Groups: Backups, Restores, and CHECKDB

ECE Engineering Robust Server Software. Spring 2018

Open Transaction Manager White Paper & Competitive Analysis The de-facto standard in Windows Open File Management

06 May 2011 CS 200. System Management. Backups. Backups. CS 200 Fall 2016

SAP HANA Disaster Recovery with Asynchronous Storage Replication

Disaster Recovery Solutions With Virtual Infrastructure: Implementation andbest Practices

Enterprise Backup Architecture. Richard McClain Senior Oracle DBA

SAN for Business Continuity

Virtualizing disaster recovery helps ensure business resiliency while cutting operating costs.

CA ARCserve Backup. Benefits. Overview. The CA Advantage

Copyright 2015 EMC Corporation. All rights reserved. Published in the USA.

Enhanced Protection and Manageability of Virtual Servers Scalable Options for VMware Server and ESX Server

Simplify and Improve DB2 Administration by Leveraging Your Storage System

Backup Exec 12 Icons Glossary

The Microsoft Large Mailbox Vision

Achieving Continuous Availability for Mainframe Tape

10 Reasons Why Your DR Plan Won t Work

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 13 Business Continuity

Designing Data Protection Strategies for Lotus Domino

2788 : Designing High Availability Database Solutions Using Microsoft SQL Server 2005

Trends in Data Protection and Restoration Technologies. Jason Iehl, Network Appliance Michael Rowan, Consultant

Buyer s Guide: DRaaS features and functionality

What s new. James De Clercq (RealDolmen) Timothy Dewin (Veeam Software)

Dell Fluid Data solutions. Powerful self-optimized enterprise storage. Dell Compellent Storage Center: Designed for business results

NS NetworkAppliance. Network Appliance Solution Architect-Backup and Restore (New)

REC (Remote Equivalent Copy) ETERNUS DX Advanced Copy Functions

Application Recovery. Andreas Schwegmann / HP

Hystax. Live Migration and Disaster Recovery. Hystax B.V. Copyright

Azure Webinar. Resilient Solutions March Sander van den Hoven Principal Technical Evangelist Microsoft

BrightStor ARCserve Backup for Windows

IBM Spectrum Protect Version Introduction to Data Protection Solutions IBM

VERITAS Backup Exec for Windows NT/2000 Intelligent Disaster Recovery

From Single File Recovery to Full Restore: Choosing the Right Backup and Recovery Solution for Your Cloud Data

Real4Test. Real IT Certification Exam Study materials/braindumps

PURITY FLASHRECOVER REPLICATION. Native, Data Reduction-Optimized Disaster Recovery Solution

Transcription:

ECE590-02 Engineering Robust Server Software Spring 2018 Business Continuity: Disaster Recovery Tyler Bletsch Duke University Includes material adapted from the course Information Storage and Management v2 (modules 9-12), published by EMC corporation.

BC Terminologies 1 Disaster recovery Coordinated process of restoring systems, data, and infrastructure required to support business operations after a disaster occurs Restoring previous copy of data and applying logs to that copy to bring it to a known point of consistency Generally implies use of backup technology Disaster restart Process of restarting business operations with mirrored consistent copies of data and applications Generally implies use of replication technologies EMC Proven Professional. Copyright 2012 EMC Corporation. All Rights Reserved. Module 9: Introduction to Business Continuity 2

BC Terminologies 2 Recovery-Point Objective (RPO) Point-in-time to which systems and data must be recovered after an outage Amount of data loss that a business can endure Recovery-Time Objective (RTO) Time within which systems and applications must be recovered after an outage Amount of downtime that a business can endure and survive Weeks Tape Backup Weeks Tape Restore Days Periodic Replication Days Disk Restore Hours Minutes Asynchronous Replication Hours Minutes Manual Migration Seconds Synchronous Replication Seconds Global Cluster Recovery-point objective Recovery-time objective EMC Proven Professional. Copyright 2012 EMC Corporation. All Rights Reserved. Module 9: Introduction to Business Continuity 3

RPO vs RTO 4

Business Impact Analysis Identifies which business units and processes are essential to the survival of the business Estimates the cost of failure for each business process Calculates the maximum tolerable outage and defines RTO for each business process Businesses can prioritize and implement countermeasures to mitigate the likelihood of such disruptions EMC Proven Professional. Copyright 2012 EMC Corporation. All Rights Reserved. Module 9: Introduction to Business Continuity 5

BC Technology Solutions Solutions that enable BC are: Resolving single points of failure Multipathing software Backup and replication Backup Local replication Remote replication Continuous replication techniues omitted for time; for details, take my Enterprise Storage Architecture ECE590 EMC Proven Professional. Copyright 2012 EMC Corporation. All Rights Reserved. Module 9: Introduction to Business Continuity 6

Backup and Archive 7

Building a backup solution cp r production/ backup/ cp r production/ backup.1/ cp r production/ backup.2/ cp r production/ backup.3/... What could go wrong? Data corruption Corrupt data overwrites backup data loss Solution: multiple snapshots 8

Building a backup solution host1 cp r production/ backup.1/ scp r host1:production/ backup.1/ cp r production/ backup.2/ scp r host1:production/ backup.2/ cp r production/ backup.3/ scp r host1:production/ backup.3/...... What could go wrong? System stolen/fails/destroyed data loss Solution: separate systems host2 9

Building a backup solution host1 scp r host1:production/ backup.1/ scp r host1:production/ backup.2/ scp r host1:production/ backup.3/... Admin What could go wrong? Admin forgets data loss Solution: automation host2 10

Building a backup solution host1 Same admin access credentials host2 What could go wrong? Attacker gains one credential Attacker can kill/corrupt all copies data loss Solution: separate credentials for backup 11

Building a backup solution Network read/write access (production use) Network read/write read-only access (backup self-service) host1 What could go wrong? User modifies primary and backup data data loss Solution: backups must be unwritable host2 12

Building a backup solution OK. OK. OK. FAILED! host1 (backup process is silent) host2 What could go wrong? Backup server quietly dies No backups kept for a while data loss Solution: backups must report on success and alert on failure 13

Building a backup solution Admin Restoration test host1 Backups run for a long time without any human intervention host2 What could go wrong? Backups were done wrong all along data not there when needed data loss Solution: periodic restoration tests 14

Tyler s Immutable Rules Of Backup A BACKUP SOLUTION MUST: 1. Record changes to data over time If I just have the most recent copy, then I just have the most recently corrupted copy. RESULT: MIRRORING ISN T BACKUP!!!! 2. Have a copy at a separate physical location If all copies are in one place, then a simple fire or lightning event can destroy all copies 3. Must be automatic When you get busy, you ll forget, and busy people make the most important data 4. Require separate credentials to access If one compromised account can wipe primary and secondary, then that account is a single point of failure 5. Be unwritable by anyone except the backup software (which ideally should live in the restricted backup environment) If I can cd to a directory and change backups, then the same mistake/attack that killed the primary can kill the backup 6. Reliably report on progress and alert on failure I need to know if it stopped working or is about to stop working 7. Have periodic recovery tests to ensure the right data is being captured Prevent well it apparently hasn t been backing up properly all along, so we re screwed If you encounter backups that don t meet these rules, explain the potential dangers until they do! 15

What is Backup? Backup It is an additional copy of production data that is created and retained for the sole purpose of recovering lost or corrupted data. Organization also takes backup to comply with regulatory requirements Backups are performed to serve three purposes: Disaster recovery Operational recovery Archive EMC Proven Professional EMC Proven Professional. Copyright 2012 EMC Corporation. All Rights Reserved. Module 10: Backup and Archive 16

Backup Granularity Full Backup Su Su Su Su Su Incremental Backup Su M T W Th F S Su M T W Th F S Su M T W Th F S Su M T W Th F S Su Cumulative (Differential) Backup Su M T W Th F S Su M T W Th F S Su M T W Th F S Su M T W Th F S Su EMC Proven Professional Amount of Data Backup EMC Proven Professional. Copyright 2012 EMC Corporation. All Rights Reserved. Module 10: Backup and Archive 17

Restoring from Incremental Backup Monday Tuesday Wednesday Thursday Friday Files 1, 2, 3 File 4 Updated File 3 File 5 Files 1, 2, 3, 4, 5 Full Backup Incremental Incremental Incremental Production Less number of files to be backed up, therefore, it takes less time to backup and requires less storage space Longer restore because last full and all subsequent incremental backups must be applied EMC Proven Professional EMC Proven Professional. Copyright 2012 EMC Corporation. All Rights Reserved. Module 10: Backup and Archive 18

Restoring from Cumulative Backup Monday Tuesday Wednesday Thursday Friday Files 1, 2, 3 File 4 Files 4, 5 Files 4, 5, 6 Files 1, 2, 3, 4, 5, 6 Full Backup Cumulative Cumulative Cumulative Production More files to be backed up, therefore, it takes more time to backup and requires more storage space Faster restore because only the last full and the last cumulative backup must be applied EMC Proven Professional EMC Proven Professional. Copyright 2012 EMC Corporation. All Rights Reserved. Module 10: Backup and Archive 19

Backup Architecture Backup client Gathers the data that is to be backed up and send it to storage node Backup server Manages backup operations and maintains backup catalog Storage node Responsible for writing data to backup device Manages the backup device Backup Data Backup Client (Application Server) Backup Server Tracking Information Storage Node Backup Catalog Backup Data Backup Device I m EMC omitting Proven Professional a lot discussion of how backup fits into enterprise-scale storage environments; for details, take my Enterprise Storage Architecture ECE590 EMC Proven Professional. Copyright 2012 EMC Corporation. All Rights Reserved. Module 10: Backup and Archive 20

Backup consistency Assume live ( hot ) backup Is data crash-consistent, or can we do better? Quiesce: To make consistent at this time (quiescent). Tell the OS that you re about to take a snapshot, request quiescence OS flushes all buffers and commits the journal, pauses all IO, says OK Take snapshot Allow OS to resume Base the backup (which takes longer) off this snapshot Resulting backup is OS consistent Can also be application-aware Same as above, but you tell the application to quiesce Requires backup-aware applications (e.g. Microsoft SQL Server, Oracle database, etc.) Resulting backups are application consistent 21

Backup targets What media? Where is it? 22

Backup to Tape Traditionally low cost solution Tape drives are used to read/write data from/to a tape Sequential/linear access Multiple streaming to improve media performance Writes data from multiple streams on a single tape Limitation of tape Backup and recovery operations are slow due to sequential access Wear and tear of tape Shipping/handling challenges Controlled environment is required for tape storage Causes shoe shining effect or backhitching EMC Proven Professional EMC Proven Professional. Copyright 2012 EMC Corporation. All Rights Reserved. Module 10: Backup and Archive 23

Backup to Disk Enhanced overall backup and recovery performance Random access More reliable Can be accessed by multiple hosts simultaneously Disk Backup/Restore Tape Backup/Restore 24 Minutes Typical Scenario: 800 users, 75 MB mailbox 60 GB database 108 Minutes EMC Proven Professional Source: EMC Engineering and EMC IT 0 10 20 30 40 50 60 70 80 90 100 110 120 Recovery Time in Minutes* I m omitting exotic backup media, such as virtual tape, as well as the entire field of digital archival; for details, take my Enterprise Storage Architecture ECE590 EMC Proven Professional. Copyright 2012 EMC Corporation. All Rights Reserved. Module 10: Backup and Archive 24

Where does the backup go? Local backup Use virtual snapshots or simple local media But wait, don t my rules call for a separate physical location? Yes, but local backup can be useful: Can have lower RPO/RTO Can be cheaper May be sufficient for non-critical workloads where data loss is survivable Local backup is useful but not sufficient for business-critical workloads! 25

Where does the backup go? Remote backup Use internet or dedicated link to go to different site This is not HA (which has practical limits on distance, but we can switch to the remote site live ), but rather just backup (can restore from backup) Result: no practical distance/latency limit May have bandwidth limitations which limit rate-of-change of primary If 5MB/s of new data is created, but backup link can do 4MB/s, then backup will get increasingly out-of-date over time Eventually acts as bottleneck on primary! 26

Summary Disaster Recovery (DR) exists to handle cases where High Availability (HA) redundancy is overwhelmed For data, the key is backups; for compute, it s secondary compute servers Backup isn t just mirroring! Rules: 1. Record changes to data over time 2. Have a copy at a separate physical location 3. Must be automatic 4. Require separate credentials to access 5. Be unwritable by anyone except the backup software (which ideally should live in the restricted backup environment) 6. Reliably report on progress and alert on failure 7. Have periodic recovery tests to ensure the right data is being captured Can do backup locally (for low cost, low RTO/RPO) and/or remotely (true DR, RTO/RPO proportional to cost) 27