Application Recovery. Andreas Schwegmann / HP

Similar documents
Trends in Data Protection and Restoration Technologies. Mike Fishman, EMC 2 Corporation

Trends in Data Protection and Restoration Technologies. Jason Iehl, NetApp

Restoration Technologies

Data Deduplication Methods for Achieving Data Efficiency

ADVANCED DEDUPLICATION CONCEPTS. Thomas Rivera, BlueArc Gene Nagle, Exar

Tom Sas HP. Author: SNIA - Data Protection & Capacity Optimization (DPCO) Committee

ADVANCED DATA REDUCTION CONCEPTS

A Promise Kept: Understanding the Monetary and Technical Benefits of STaaS Implementation. Mark Kaufman, Iron Mountain

Cloud Archive and Long Term Preservation Challenges and Best Practices

Multi-Cloud Storage: Addressing the Need for Portability and Interoperability

LEVERAGING FLASH MEMORY in ENTERPRISE STORAGE

PRESENTATION TITLE GOES HERE. Understanding Architectural Trade-offs in Object Storage Technologies

Tiered File System without Tiers. Laura Shepard, Isilon

in Transition to the Cloud David A. Chapa, CTE EVault, a Seagate Company

Virtualization Practices: Providing a Complete Virtual Solution in a Box

Everything You Wanted To Know About Storage (But Were Too Proud To Ask) The Basics

Chapter 10 Protecting Virtual Environments

Virtualization Practices:

Storage in combined service/product data infrastructures. Craig Dunwoody CTO, GraphStream Incorporated

Deploying Public, Private, and Hybrid. Storage Cloud Environments

EMC Data Protection for Microsoft

Create a Smarter and More Economic Cloud Storage Architecture. November 7, 2018

IBM Spectrum Protect Version Introduction to Data Protection Solutions IBM

Data Protection Modernization: Meeting the Challenges of a Changing IT Landscape

IBM Tivoli Storage Manager Version Introduction to Data Protection Solutions IBM

The Role of WAN Optimization in Cloud Infrastructures. Josh Tseng, Riverbed

Copyright 2010 EMC Corporation. Do not Copy - All Rights Reserved.

Protect enterprise data, achieve long-term data retention

Expert Insights: Expanding the Data Center with FCoE

Blockchain Beyond Bitcoin. Mark O Connell

Storage Virtualization II Effective Use of Virtualization - focusing on block virtualization -

Copyright 2012 EMC Corporation. All rights reserved.

Interoperable Cloud Storage with the CDMI Standard. Mark Carlson, SNIA TC and Oracle Co-Chair, SNIA Cloud Storage TWG

Planning For Persistent Memory In The Data Center. Sarah Jelinek/Intel Corporation

LTFS Bulk Transfer Standard PRESENTATION TITLE GOES HERE

PRESENTATION TITLE GOES HERE

Azure Webinar. Resilient Solutions March Sander van den Hoven Principal Technical Evangelist Microsoft

ASPECTS OF DEDUPLICATION. Dominic Kay, Oracle Mark Maybee, Oracle

Facing an SSS Decision? SNIA Efforts to Evaluate SSS Performance. Ray Lucchesi Silverton Consulting, Inc.

Interoperable Cloud Storage with the CDMI Standard. Mark Carlson, SNIA TC and Oracle Chair, SNIA Cloud Storage TWG

Trends in Data Protection CDP and VTL

Felix Xavier CloudByte Inc.

The Data-Protection Playbook for All-flash Storage KEY CONSIDERATIONS FOR FLASH-OPTIMIZED DATA PROTECTION

Technology Insight Series

SRM: Can You Get What You Want? John Webster, Evaluator Group.

A Crash Course In Wide Area Data Replication. Jacob Farmer, CTO, Cambridge Computer

Analysis and Optimization. Carl Waldspurger Irfan Ahmad CloudPhysics, Inc.

Redefine Data Protection: Next Generation Backup And Business Continuity

Disk-to-Disk backup. customer experience. Harald Burose. Architect Hewlett-Packard

4125 / 3807 The Power Of Combining Backup To Disk And Tape With HP Data Protector 5.5

Storage Virtualization II. - focusing on block virtualization -

Remove complexity in protecting your virtual infrastructure with. IBM Spectrum Protect Plus. Data availability made easy. Overview

Massively Scalable File Storage. Philippe Nicolas, KerStor

Chapter 11. SnapProtect Technology

Scaling Data Center Application Infrastructure. Gary Orenstein, Gear6

Chapter 7. GridStor Technology. Adding Data Paths. Data Paths for Global Deduplication. Data Path Properties

Use Cases for iscsi and FCoE: Where Each Makes Sense

OpenStack Manila An Overview of Manila Liberty & Mitaka

Dell PowerVault DL2100 Powered by CommVault

Chapter 2 CommVault Data Management Concepts

Modernize Your Backup and DR Using Actifio in AWS

Identifying and Eliminating Backup System Bottlenecks: Taking Your Existing Backup System to the Next Level

TOP REASONS TO CHOOSE DELL EMC OVER VEEAM

How to Protect SAP HANA Applications with the Data Protection Suite

Understanding Virtual System Data Protection

Accelerate the Journey to 100% Virtualization with EMC Backup and Recovery. Copyright 2010 EMC Corporation. All rights reserved.

BACKUP AND RECOVERY OF A HIGHLY VIRTUALIZED ENVIRONMENT

Felix Xavier CloudByte Inc.

SNIA Tutorial 1 A CASE FOR FLASH STORAGE HOW TO CHOOSE FLASH STORAGE FOR YOUR APPLICATIONS

Overview and Current Topics in Solid State Storage

SRM: Can You Get What You Want? John Webster Principal IT Advisor, Illuminata

Offers easy management of all protected devices and data through a unified secure touchfriendly web-based management console.

EVERYTHING YOU WANTED TO KNOW ABOUT STORAGE, BUT WERE TOO PROUD TO ASK Part Cyan Storage Management. September 28, :00 am PT

Trends in Worldwide Media and Entertainment Storage

Notes & Lessons Learned from a Field Engineer. Robert M. Smith, Microsoft

Veeam Backup & Replication v6

StarWind Virtual SAN Free

Ron Emerick, Oracle Corporation

ECE Enterprise Storage Architecture. Fall 2018

Benefits of Multi-Node Scale-out Clusters running NetApp Clustered Data ONTAP. Silverton Consulting, Inc. StorInt Briefing

WHAT HAPPENS WHEN THE FLASH INDUSTRY GOES TO TLC? Luanne M. Dauber, Pure Storage

Overview and Current Topics in Solid State Storage

Adrian Proctor Vice President, Marketing Viking Technology

The File Systems Evolution. Christian Bandulet, Sun Microsystems

Ramin Elahi, Adjunct Faculty UC Santa Cruz Silicon Valley


Chapter 9 Protecting Client Data

Get More Out of Storage with Data Domain Deduplication Storage Systems

Effective Storage Tiering for Databases

Data Protector. Software Version: Zero Downtime Backup Integration Guide

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

Red Hat Enterprise Virtualization (RHEV) Backups by SEP

SAS: Today s Fast and Flexible Storage Fabric. Rick Kutcipal President, SCSI Trade Association Product Planning and Architecture, Broadcom Limited

Symantec Backup Exec 2012 OEM FAQ

Enhanced Protection and Manageability of Virtual Servers Scalable Options for VMware Server and ESX Server

Data Protection for Virtualized Environments

Jeff Dodson / Avago Technologies

Chapter 1. Storage Concepts. CommVault Concepts & Design Strategies:

Symantec NetBackup 7 for VMware

The Benefits of Solid State in Enterprise Storage Systems. David Dale, NetApp

Transcription:

Intelligent PRESENTATION Architecture TITLE GOES HERE for Application Recovery Andreas Schwegmann / HP

SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless otherwise noted. Member companies and individual members may use this material in presentations and literature under the following conditions: Any slide or slides used must be reproduced in their entirety without modification The SNIA must be acknowledged as the source of any material used in the body of any document containing material from these presentations. This presentation is a project of the SNIA Education Committee. Neither the author nor the presenter is an attorney and nothing in this presentation is intended to be, or should be construed as legal advice or an opinion of counsel. If you need legal advice or a legal opinion please contact your attorney. The information presented herein represents the author's personal opinion and current understanding of the relevant issues involved. The author, the presenter, and the SNIA do not assume any responsibility or liability for damages arising out of any reliance on or use of this information. NO WARRANTIES, EXPRESS OR IMPLIED. USE AT YOUR OWN RISK. 2

Abstract You will get an introduction into the challenges and trends to architect application backup and recovery in an on-premise, cloud, and hybrid IT environment. You will be guided through all layers from the service down to the physical hardware. You will learn how to recover end user business data up to the recovery of the entire application farm distributed across complex and virtualized environments. You will get some ideas how to deal with the human factor in IT environments with distributed responsibilities. The session discusses how to balance service level against cost. 3

Agenda Challenges Trends Ownership Backup Recovery Virtualization Cloud Conclusion 4

Challenges? Blue line exponential data volume growth & complexity growth = the bullets on this slide Green line IT budget is flat Exponential data growth Cheaper storage More performance Long term retention Duplicate data Complexity growth Scale up & out High availability Virtualization Cloud EaaS (Everything as a Service) Search Security & compliance 5

Where Does Recovery Live? Application resilience Application build in backup tools Templates Golden images Virtual Machines Application specific 3rd party tools Storage specific tools Backup software Across multiple applications & storage Operations management software Across all IT The cloud 6

The No Backup Trend unsinkable ship vs. rescue boat Application build in replication Optional automatic fail over Lagged databases Transaction logging & replication Self healing Consistency ckeck and repair Defect page detection and repair Versioning Recycle bin Deleted item are kept in a recycle bin Build in archive 7

Application Backup Trends Applications live in VMs Applications live in the cloud Cloud based recovery services No backup window No performance degradation during backup Recovery to any point in time Data reduction Deduplication, primarily of repeated full backups Consolidation of incremental backups Seamlessly link disk with tape & cloud backup Recovery automation & simplification The know how to recover is build in Any level of granularity Server farm down to single document, mail,... 8

What to Recover? Single items / end user domain Files & Directories / Libraries Database entry, record, table, transaction Document, e-mail, blog Calendar, tasks, contacts E-mail box, user site Application Database Search index & services Application configuration Infrastructure Binaries, OS, configurations Physical servers Virtual servers Server farm Disk array 9

Use Cases Beyond Recovery Data Migration On premise -> cloud Cloud -> on premise Service provider A -> B Testing Recovery Development test data Deployment Data warehousing E-Discovery Forensic analysis Archiving 10

Who Does What? Application Users DB Content Admin Help Desk DB Infrastructure Admin Security User A should not be able to see data from user B. The administrator should not be forced to break into the end user privacy. DB administrator might not have the right to restore from backup. Processes Application administrators might not be connected with backup administrators. Different users groups use different user interfaces Users and administrators don t want more tools, they want to manage from their tools. Backup Admin Server Farm Admin 11

Application Driven Single Item Recovery Application Administrator Filter Search Self service Single items now recoverable incl. all meta data Executed by the application admin rather than backup admin No unnecessary internal IT call routing No extra tool to learn Directly plugged into the Application Admin console No scripting / additional interfaces to learn Flexibility in selecting backup sources

How to Reduce the Data Volume? Full backup Incremental backup Changes since last backup Differential backup Changes since last full backup Compression Deduplication Granularity File Block size Chunk size Incremental & differential recovery 13

Application Consistency When is an application consistent? Data is valid at the same point in time Data is complete How to accomplish consistency for backup? Offline backup - application shutdown Crash consistent backup = snapshot without interaction Application aware backup application interaction 14

Consistency Application Offline Backup Shutdown the application / database Guarantees application consistency All cache data copied to disk All transactions closed Optional: database consistency check Backup to another disk / tape OR create a snapshot Optional: move / delete the transaction logs Frees disk space Enables incremental backup based on transaction logs Start the application Optional: backup the snapshot to another disk or tape Recycle the snapshot Keep the last N snapshots Snapshot rotation 15

Crash Consistent Backup Create a snapshot while the application runs Consistency has the same quality as after a system crash Most applications / databases can survive system crashes But some don t and some not always. Recovery can not be guaranteed Consistency Group All volumes used by the application need to be snapped at the same point in time Use cases 7 x 24 operations -> no backup window Virtual Machine backup without agent or service API Application lacks online backup mode feature No resources for transaction logging during backup Snapshots enable more points in time Might reduce the risk 16

Consistency Application Aware Backup Database(s) are in backup mode during backup Data files don t change while in backup mode Changes during backup happen in the cache and go into logs After backup all changes are applied to the data files Optional: backup of the transaction logs & delete logs afterwards Optional: ongoing log file backup after database backup -> CDP Consistent search index All databases need to go into the backup mode Across the server farm Use cases 7 x 24 operations -> no backup window Guaranteed & fully supported consistent recovery 17

Application Backup Interfaces Application specific tools via GUI, CLI General purpose API Streaming backup API Direct copy Access to in-memory copy of data, cached by the application Minimizes redundant memory copies Incremental backup Access to changed blocks / pages or transactions Optional features Granularity below database level Compression Encryption Sequential access is optimal for streaming media 18

Volume based Backup API Snapshot focused Creates application consistent volumes ready for backup Use cases Copy the entire volume via snapshot Copy all files needed to recover the application Incremental backup Changed blocks Changed files Feature set might be different compared to streaming API Backup to disk & restore from disk Trend: volume based backup Better for backup to disk Better for virtualization 19

Reduced Performance Impact Application Server Backup Proxy Server Separate backup proxy server Backup from full copy snapshot (mirror) Application switches into backup mode Split the snapshot Back to normal mode Separate backup proxy server copies the data from split mirror Resync the mirror after backup Copies changed blocks only 20

Application Recovery from Snapshot Application SAN t t 0 t - t 1-2 LAN recovery images on disk Optional backup proxy server Application shutdown Optional incremental transaction log backup Switch to selected snapshot Instead of restore from tape Transaction log roll forward From backup Or original disk Up to the most recent point in time Application recovered

Single Item Recovery Options Dumpster, 2nd level dumpster, versioning, archive Lagged database replicas maintained by the application Full blown recovery environment & copy back Spare systems Virtual Machines The application can be used to extract single items from backup Copy database from backup & mount as recovery database Needs extra space and time to copy the entire database Mount the database from the backup directly into the application Open the backup database with a separate tool & extract Extract single items directly from the backup Catalog of all single items during or shortly after backup Single item recovery from single item backup Needs a separate brick level backup 22

Single Item Recovery from Snapshot Application SAN t t 0 t - t 1-2 LAN recovery images on disk Optional backup proxy server Mount database from snapshot Browse & search through the database Using 3rd party tool Using the application Unmount the snapshot Challenges Which snapshot to use? Snapshot retention

Server Virtualization Normal Operation hypervisor / host OS Superman Backup Backup hypervisor / host OS Donkey cart Resources shared among different applications Normal load spreads evenly across day / week / month Backup load is exceptional Resources on physical server often not enough for backup load 24 hypervisor / host OS Sna Snapshot Backup Mount Copy Offload backup via dedicated physical machine Utilize replication 24

VM vs Hypervisor Level Backup hypervisor / host OS VM level backup Same application recovery experience Empowered VM user Higher effort to manage for many VMs Hypervisor level backup Easier to manage Image backup Better for Disaster Recovery use cases (see next slide) 25

VM Recovery Use Cases Recovery Use Case VM Level Backup VM subset +++ + One VM ++ +++ Set of VMs + +++ Hypervisor Level Backup Subset of data in a VM Files and directorys Application specific objects, e. g. e-mail, database, One VM disaster recovery To the original place To a different place Set of VMs Same datacenter Different datacenter Application farm Physical server crash Site disaster 26

Virtualization & Deduplication Deduplication location Source Backup proxy Backup server Backup target Deduplication of the VM Same ratio as physical server Deduplication across VMs Same or similar VM OS Same applications Common data stored per VM 27

Application Recovery From The Cloud Scenario Application always on premise Advantages Remote backup Storage from LAN socket Challenges Bandwidth Latency Recovery speed Solutions D2D2C (Disk-to-Disk-to-Cloud) Differential recovery Recovery shipment 28

Application Recovery Into The Cloud Backup data Scenario Application on premise DR: Application in the cloud Advantages Remote backup Storage from LAN socket DR datacenter in the cloud Challenges Bandwidth & latency during backup Solutions D2D2C 29

Application Recovery Inside The Cloud Application Users Application Admin IT staff Server Farm Admin Help Desk Backup Admin Copy Backup Scenario Application in the cloud Who does the backup? Same SLA for all VMs? Who can define the SLA? Who recovers what? Hypervisor Virtual Machine Single file from the VM Application Application data object End user self service 30

The Cloud Challenge Security vs. Efficiency Encryption is in conflict with Deduplication Compression Search Process in the right order Snapshot Search index Catalog Deduplication Compression Encryption Challenge Workload moves to the source 31

The Transformation Driven by Virtualization Management Flexibility Recovery as a Service Policy based automated protection Cloud infrastructures Efficient backup HA Migration Automation Virtualization on a single system 0% 50% 100% % of servers virtualized

Conclusion Even an unsinkable ship needs rescue boats How many passengers? Buffer? What are the data loss scenarios? What can happen? What are your recovery use cases? Who is involved into the recovery process? Risk <-> Cost How much data do you accept to loose? How long can you afford to be offline? Backup stays the last line of defense No matter whether your server is physical or virtual No matter whether data lives on premise or in the cloud 33

Related Hands-On LAB Storage Virtualization 34

Attribution & Feedback The SNIA Education Committee thanks the following individuals for their contributions to this Tutorial. Authorship History Jason Iehl, Andreas Schwegmann / April, 2010 Updates: Andreas Schwegmann / October 12, 2010 Andreas Schwegmann / April 7, 2011 Andreas Schwegmann / November 3, 2011 Mike Peebles / April 2, 2012 Andreas Schwegmmann / April 2, 2013 Additional Contributors Klaus Bloecher, HP Harald Burose, HP Mike Peebles, HP Antal Nemes, ComTrade Michael Fishman, EMC Jason Iehl, NetApp Larry Freeman, NetApp Ross Smith, Microsoft Nancy Clay, SNIA Please send any questions or comments regarding this SNIA Tutorial to tracktutorials@snia.org 35