Chapter 1. Storage Concepts. CommVault Concepts & Design Strategies: https://www.createspace.com/

Similar documents
Chapter 11. SnapProtect Technology

Chapter 10 Protecting Virtual Environments

Chapter 3 `How a Storage Policy Works

Chapter 9 Protecting Client Data

Chapter 16 Content Based Planning Methodology

Chapter 2 CommVault Data Management Concepts

Dell PowerVault DL2100 Powered by CommVault

Archiving, Backup, and Recovery for Complete the Promise of Virtualisation Unified information management for enterprise Windows environments

HPE Converged Data Solutions

Simplify Backups. Dell PowerVault DL2000 Family

Evolved Backup and Recovery for the Enterprise

Chapter 12 Compliance, Records Management & ediscovery

EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR ITALY

EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR AMERICAS

Protecting Microsoft Hyper-V 3.0 Environments with Arcserve

EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR APJ

arcserve r16.5 Hybrid data protection

EMC GLOBAL DATA PROTECTION INDEX STUDY KEY RESULTS & FINDINGS FOR THE USA

Dell DR4000 Replication Overview

EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR INDONESIA

EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR BRAZIL

Understanding Virtual System Data Protection

EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR AUSTRALIA

Backup vs. Business Continuity

EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR HONG KONG

Disaster Recovery Is A Business Strategy

Executive Summary SOLE SOURCE JUSTIFICATION. Microsoft Integration

The Ultimate Guide for Virtual Server Protection

EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR INDIA

EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR UAE

CIO Guide: Disaster recovery solutions that work. Making it happen with Azure in the public cloud

CommVault Simpana 9 Virtual Server - Lab Validation

User Guide - Exchange Database idataagent

5 Things Small Businesses Need to Know About Disaster Recovery

Quick Start Guide - Exchange Database idataagent

University Information Technology Data Backup and Recovery Policy

Achieving Rapid Data Recovery for IBM AIX Environments An Executive Overview of EchoStream for AIX

Data Protection. Rethinking. Michael Andrews, Director, Enterprise Data Protection, APJ HP Autonomy IM

Trends in Data Protection CDP and VTL

Dell PowerVault DL Backup-to-Disk Appliance Powered by CommVault

Controlling Costs and Driving Agility in the Datacenter

DEDUPLICATION BASICS

Farid SAADI. Senior Systems Engineer, Backup Recovery Systems

Availability and the Always-on Enterprise: Why Backup is Dead

Elevate the Conversation: Put IT Resilience into Practice for Cloud Service Providers

Protecting VMware vsphere/esx Environments with Arcserve

Optimizing and Managing File Storage in Windows Environments

EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR TURKEY

A CommVault White Paper: Business Continuity: Architecture Design Guide

PROTECT YOUR DATA, SAFEGUARD YOUR BUSINESS

A Promise Kept: Understanding the Monetary and Technical Benefits of STaaS Implementation. Mark Kaufman, Iron Mountain

Protecting VMware vsphere/esx Environments with CA ARCserve

EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS AND RESULTS FOR FRANCE

Chapter 15 Technical Planning Methodology

ZYNSTRA TECHNICAL BRIEFING NOTE

How to solve your backup problems with HP StoreOnce

CommVault Galaxy Data Protection 7.0 for Microsoft Exchange Systems

THE STATE OF CLOUD & DATA PROTECTION 2018

ATEMPO UNITED BACKUP EDITION DATA PROTECTION

First Financial Bank. Highly available, centralized, tiered storage brings simplicity, reliability, and significant cost advantages to operations

Technology Insight Series

The Microsoft Large Mailbox Vision

IBM Storage Software Strategy

THE FOUR STEPS TO A TAPELESS BACKUP ENVIRONMENT: YOUR HOW-TO GUIDE FOR DATA MANAGEMENT SUCCESS INTRODUCTION

White Paper: Backup vs. Business Continuity. Backup vs. Business Continuity: Using RTO to Better Plan for Your Business

EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR SOUTH KOREA

Backup and Recovery. Backup and Recovery from Redstor. Making downtime a thing of the past Making downtime a thing of the past

Redefine Data Protection: Next Generation Backup And Business Continuity

Trends in Data Protection and Restoration Technologies. Mike Fishman, EMC 2 Corporation

EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR SOUTH AFRICA

Data Management at Cloud Scale CommVault Simpana v10. VMware Partner Exchange Session SPO2308 February 2013

EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR MEXICO

EMC GLOBAL DATA PROTECTION INDEX KEY FINDINGS & RESULTS FOR JAPAN

Conducted by Vanson Bourne Research

EMC GLOBAL DATA PROTECTION INDEX STUDY KEY FINDINGS & RESULTS FOR THE NETHERLANDS

Protecting Mission-Critical Application Environments The Top 5 Challenges and Solutions for Backup and Recovery

What you need to know about cloud backup: your guide to cost, security, and flexibility. 8 common questions answered

Backup vs. Business Continuity: Using RTO to Better Plan for Your Business

Copyright 2010 EMC Corporation. Do not Copy - All Rights Reserved.

Redefine Data Protection: Next Generation Backup & Business Continuity Solutions

Disaster Recovery Guide

BUSINESS CONTINUITY: THE PROFIT SCENARIO

A Practical Guide to Cost-Effective Disaster Recovery Planning

The Data-Protection Playbook for All-flash Storage KEY CONSIDERATIONS FOR FLASH-OPTIMIZED DATA PROTECTION

Archive 7.0 for File Systems and NAS

Balakrishnan Nair. Senior Technology Consultant Back Up & Recovery Systems South Gulf. Copyright 2011 EMC Corporation. All rights reserved.

THE COMPLETE GUIDE HADOOP BACKUP & RECOVERY

UNITRENDS & NUTANIX ARCHITECTURE & IMPLEMENTATION GUIDE

15-MINUTE GUIDE. SMARTER BACKUP Transform your future

Chapter 4 Data Movement Process

The Three Data Challenges

The case for cloud-based data backup

Comprehensive Agentless Cloud Backup and Recovery for the Enterprise

Buyer s Guide: DRaaS features and functionality

Asigra Cloud Backup Provides Comprehensive Virtual Machine Data Protection Including Replication

COMPREHENSIVE RETENTION COMPLIANCE: HOW KEEPITSAFE ONLINE BACKUP CAN HELP YOUR BUSINESS


Commvault Backup to Cloudian Hyperstore CONFIGURATION GUIDE TO USE HYPERSTORE AS A STORAGE LIBRARY

Data safety for digital business. Veritas Backup Exec WHITE PAPER. One solution for hybrid, physical, and virtual environments.

Dell Compellent Storage Center with CommVault Simpana 9.0. Best Practices

Transcription:

Chapter 1 Storage Concepts

4 - Storage Concepts In order to understand CommVault concepts regarding storage management we need to understand how and why we protect data, traditional backup methods, and the CommVault philosophy for data management. Modern management of protected data is much more complicated than in previous times. Everything from documents, e-mails, databases, and even phone conversations and video surveillance is being digitized and stored. Though the capacity to store and transmit data has greatly increased, the philosophy of managing this data in the backup environment has for the most part remained the same. Most data protection software simply backs up server data and manages it based on physical locations. Using CommVault software, intelligent, logical management of data and information is possible to meet a variety of business needs. The term Business Needs will be used extensively in this book. It is important to understand that any technical decisions regarding data storage should always be based on business needs and not technical biases or legacy methodology. CommVault Simpana software adds greater flexibility to the management of business information. Evolution of Data Protection Data protection has evolved considerably throughout the years. When data was managed centrally through proprietary mainframe and midrange computer systems, data could easily be protected in a consolidated backup environment. As microcomputers became more common, data protection became more complex due to the separation of data on many computer systems. As faster network bandwidth became available, it again became possible to centrally consolidate and manage backup data. As backups became decentralized, so did backup software. Software was installed individually on each computer system requiring protection. This added great complexity to data management. With higher bandwidth and larger tape backup systems, data could again be consolidated, however most backup software was simply modified to meet changing needs. CommVault Simpana software was designed from the bottom up to be a true enterprise data management software suite. It allows data to be managed in a centralized or decentralized environment with a common interface for managing all protected information. An evolutionary design in backup software emerged with the concept of policy driven data management. The idea of managing data based on business needs rather than physical placement of data on a server allowed backup engineers to design robust storage solutions. CommVault software implements this design strategy through the use of storage policies A storage policy allows data to be logically centralized and managed based on storage and retention needs regardless of whether the data itself is physically centralized or decentralized. This provides the freedom to manage data in an infinite number of possibilities. Though this may seem like a complex method for managing backup data, the using a singular and intuitive interface for data management simplifies the complex tasks of managing protected data. CommVault software provides flexibility to meet all of today s and tomorrow s business needs providing data backup, data archiving, snapshot technology, and data replication solutions through a common management interface.

Storage Concepts - 5 Reasons for Protecting Data The reasons we protect data will vary for different companies. Though every company may have their own unique reasons for protecting business data, the underlying, basic reasons can be classified into the following categories: Disaster Recovery Data Recovery Data Preservation & Compliance Disaster Recovery From a server crashing, to site loss, to major disasters affecting entire cities, it is critical to protect data based on perceived risk. Someone living in Seattle may be worried about an earthquake or a volcano eruption, while someone in the Midwest may feel tornados are the biggest problem. Identifying potential risks allows you to properly plan for a disaster. With all critical business systems, two numbers must be generated to properly prepare for a disaster: Recovery Time Objective (RTO) Recovery Point Objective (RPO) Recovery Time Objective RTO is the time it takes to recover from the point a critical business system is no longer available. These numbers should not be based on recovery of all systems; instead business systems should be prioritized and RTO numbers should be established based on the order in which you need to recover these systems. Example: If a file server crashes and users lose access to home folders, a 48 hour recovery window may suffice. However, a critical database which is responsible for orders processing which, if down may cause your company to go out of business, may have a four hour recovery window. Of course everyone in your company may think their system is the most critical. Your CFO may need Accounts Receivable up first to ensure revenue continues. Your CEO may want e-mail up first so he can monitor the recovery. Your CIO may want the DNS server up first because without it, none of the systems can communicate with each other. So when determining your RTO, be sure to factor in both technical dependencies and business requirements. Recovery Point Objective The RPO defines your acceptable amount of data loss measured in time based on business systems. If you send tapes off-site on a weekly basis you have an RPO of seven days. The RPO, like the RTO, should always be based on business requirements. Losing seven days of user data may not cause you to go out of business but losing just 1 hour of your orders database may result in millions of dollars of lost revenue. Even more critical will be customer confidence and public relations problems when ordered merchandise never shows up.

6 - Storage Concepts No business decision maker would accept data loss if there was not a cost involved. Though you can attain a near zero RPO using replication or redundant systems it will come at a great cost and there will always be a risk of some data loss. The Recovery Point Objective should be based on realistic expectations, perceived risk, and budget limitations. Data Recovery Disaster recovery has traditionally been the main reason we backup data but the ability to recover user data at a more granular level is extremely important as well. Let s say your sales manager is working on a huge proposal which can double your company s revenue almost overnight. The proposal documents are lost or become corrupt and they are asking you to recover them. Unfortunately the most recent backup has been sent off-site and it will take 24 hours to bring it back. By that time your company loses the deal to a competitor. For this reason, Service Level Agreements or an SLA should be set defining the acceptable length of time to recover user data. It is recommended to always have at least two additional copies of your critical production data available at all times. One copy should be stored offsite for use during disaster recovery. The other copy should be kept local for accessibility of data restoration. Data Preservation & Compliance Because of compliance and government regulations, companies must maintain copies of financial data and communications such as e-mail and legal documents. This data usually needs to be kept for long periods of time. Just as you need to keep your personal tax records, your company needs to hold onto their records in case they are requested by government or legal entities. Financial data usually has requirements defined to take a point-in-time backup every fiscal boundary (month, quarter, and year) and archived for later recovery if necessary. Should problems arise, these records can be recovered and the company s fiscal responsibilities and reporting validated. E-mail correspondence should also be archived. This may be easier with some e-mail applications then others. There are various methods to protecting e-mail from database backups to journaling. Looking beyond the backup method, companies need to consider what e-mail needs to be retained, how the content of those e-mails can be searched, and how easy it is to restore those e-mails. Money and time saved performing backups in a certain manner may well be insignificant when compared to the cost of restoring the data.

Storage Concepts - 7 Breaking from Tradition: The New Technologies for Big Data Traditional methods for protecting data are quickly giving way to new concepts and technologies that are revolutionizing the way we protect data. When this book was originally written in 2008, these concepts were just emerging and now they are everywhere. The concepts briefly discussed here will be extensively covered and integrated into all chapters throughout this book. Deduplication Deduplication is the concept of writing unique data blocks only once to disk media. If the same block needs to be written to disk again, from a duplicate file or subsequent backup of the same data, the original block is simply referenced by the new data being written. This results in substantial space savings when protecting data. Simpana v9 deduplication is a content aware deduplication solution which will not only provide considerable space savings on disk, but will also greatly reduce network bandwidth consumption during data protection operations. Virtualization Many people know the benefits in cost reduction and administrative overhead in virtualizing data centers. A major issue with virtualization is by consolidating so much data in such close proximity, protecting the data becomes more of a challenge. Another major concern is the abuse of the technology in that everyone wants a server for something. The result is over time, hundreds or even thousands of virtual machines which makes it more difficult to keep track of and protect the environment. The Simpana Virtual Server Agent (VSA) simplifies protecting virtual machines by integrating with the hosting virtual infrastructure to coordinate snapshots of the machines and then backing up the snapshots. During the backup operations the virtual disks will be indexed providing full machine recovery, volume recovery, or granular recovery of objects within the virtual disks. Integrating the VSA Agent with Simpana Deduplication, hundreds of virtual machines can be protected within short backup windows. Integrating these two components will provide for considerably faster backups and much less disk media required to store the protected machines. Snapshot Technologies Using hardware based snapshot technologies provides for extremely fast protection and recovery/failover for short term protection. Simpana software enhances these capabilities through the SnapProtect Agent. For supported hardware, the SnapProtect agent can manage snapshots on the hardware through the CommCell console providing easier administration. The SnapProtect agent can also backup snapshots, indexing the data providing full snap recovery as well as granular browse and recovery capabilities. By integrating the SnapProtect feature with Simpana application idataagents, application aware snapshots and backups can be conducted. This intelligence provides a major advantage over normal hardware snapshots which snap volumes without awareness of what is being snapped. The coordination of the SnapProtect feature and application agents can also be extended into virtual environments to provide complete protection of virtualized applications.

8 - Storage Concepts Replication With disk storage, deduplication, and WAN bandwidth becoming very affordable, replicating data to off-site storage has become a very effective and efficient high availability and disaster recovery solution. Simpana software works with replicated disks and also has its own replication, Continuous Data Replicator (CDR) to replicate production data for high availability. Using Simpana Deduplication and DASH Copy, the intelligent replication of CommVault protected data can be used as an effective disaster recovery solution. Cloud Storage Cloud storage makes use of on-demand hosted storage solutions and Internet connections to protect data. It is affordable for many companies that do not want to invest in a high end and expensive disk storage solution. Though not ideal for backing up large amounts of data, it is a good solution for small offices, data archiving, remote user backups, and Simpana SILO storage. Records Management and DLM Traditionally data was simply managed as large unintelligent stores which were backed up and restored without regards to content. Intelligent Archiving allows data to be managed based on content and not just location. By indexing data, content searches can be performed. Information meeting search criteria such as file type and keywords can then be copied to alternate locations for data preservation. The concept of Records Management and Data Lifecycle Management (DLM) allows specific information to be preserved to meet compliance requirements. Beyond the lifecycle of the information it can be destroyed. Protection on the Edge Another emerging need in the modern datacenter is to provide protection for end user workstations. Whether on the road or in a cubicle the need to protect end user data is a critical aspect of a comprehensive data protection strategy. Just hoping that all users store important files in their home folders on the network is not good enough. The Simpana Desktop laptop Option (DLO) can be used to provide granular protection of workstation data. By using custom subclients and client side deduplication, data can be quickly and discretely be protected over wired and/or wireless networks. The files can optionally be browsed, recovered or downloaded by the end user for recovery through a web user interface. The protected data can also be content indexed for compliance and legal requirements. Anything Anytime Anywhere User data, whether from their workstation, Email, or home folders can all be searched through a web interface. Optional content indexing of user data can be used for content based searches. This feature extends not only to their workstations but also to mobile devices. Files can be downloaded to mobile devices to provide access to critical information no matter where the user is. The capabilities discussed in this section will undoubtedly be expanded upon as the Simpana product suite continues to evolve and revolutionize the way data and information is managed. Providing a comprehensive approach to data management provides enormous power not only for Simpana administrators but application, storage, and network administrators as well as the end user.