Transcript Slide 1
Double-Take Software Overview A Platform for Recoverability www.doubletake.com Agenda • Introduction to Double-Take Software • Double-Take Software Products and Technology • Client testomonial • Q&A www.doubletake.com About Double-Take Software, Inc. Leading Provider of Software Solutions for Recoverability Including Continuous Data Replication, Application Availability and System State Protection. • Headquartered in Southborough, MA • Worldwide Reach - North America, South America, Europe, Pacific Rim • Focused on the protection of business-critical applications – 125,000 licenses of Double-Take in over 10,000 customers – 35,000+ licenses protecting Exchange – 35,000+ licenses to protecting SQL • Comprehensive Professional Services Offerings • Prestigious Microsoft Certifications www.doubletake.com Your Solution Needs • What challenges are you facing in your DR plan? • What types of servers do you want to protect? • About how much data do you have to protect? • Have you chosen a DR Site? • What kind of connection will you have? • Do you have an RTO and RPO defined? www.doubletake.com The Keys to Recoverability Replication Host-based, real-time, byte-level, asynchronous replication across any distance with WAN optimization to minimize bandwidth usage and requirements Failover Real-time monitoring for automatic or manual failover for individual applications, file shares, and whole servers - locally or remotely Recovery Recover data or entire servers over any distance while users remain online, with minimum downtime www.doubletake.com Data Protection • System Friendly Asynchronous Replication – Low CPU Overhead – Defined Memory and Disk Usage – Write Order Intact Replication • Bandwidth Friendly Data Movement – User-definable Replication Sets – Compression, Scheduling, Scheduled Bandwidth Throttling capabilities • Point-in-Time Recovery – Integration w/Volume Shadow Copy Services www.doubletake.com Double-Take – Technology Overview Source Target Applications Applications OS OS Double -Take Filter Disk Systems Disk Systems www.doubletake.com Double-Take – Technology Overview Source I/O Operations examined in Kernel Memory Applications Protected File? OS Write or Change? Yes No Disk Systems www.doubletake.com Double-Take – Technology Overview Always: Target Same I/O order Same Data Applications Same File Option: OS Different Directory Disk Systems www.doubletake.com Double-Take – Queuing and Error Correction Send Queue Source Applications OS Target Applications OS Rcv Queue Double-Take Filter Ack Queue Disk Systems Disk Systems www.doubletake.com Failover Solutions • Application-Level Failover (RTO = ~30min) – Applications like Exchange, SQL and File Servers using the Application Manager capabilities – Works with Cluster-based Deployments • Full-Server Failover (RTO = ~30min) – Custom-developed applications or applications dependent on system state information – Replicate and Failover OS, Applications and Data – Works for all stand-alone Windows Servers – Assists in One-to-One Server Migrations www.doubletake.com How Application Failover Works Source Target Replication Failover Monitoring • IP ICMP or Heartbeat Monitoring • Application Services Started • Detect Failure in Seconds or Minutes • Failover Name, IP and/or DNS Records • Failover Active Directory Hostname • Users can reconnect within minutes of failure • Failover can occur across a LAN, WAN and even NAT • Failover more than one Server Identity to the Same Target Server • Failover Scripting for Custom Configurations www.doubletake.com How Application Failback Works Source Target Restoration Replication Failover Monitoring • Recover or Replace Source Server • Failback Source Identity • Restore Data to the Source Server • Bring Source Application Online • Users Reconnect Within Minutes • Start Replication and Resume Failover Monitoring for Continued Protection www.doubletake.com How Full-Server Failover Works Staging Area OS and Applications Data Volumes User and Application Data www.doubletake.com Server Recovery Option • • • • • Tier 2/Tier 3 Server Recovery (RTO = 4-24 hours) Same Recovery Type as FFO Local, Remote or Both Restore to Physical or Virtual Systems Assists with “Swing-Server” Migrations www.doubletake.com Double-Take Server Recovery Option Protect Multiple Production Servers With One SRO Image Server Recover Back to the Original Server, to New Hardware, or to a Virtual Machine www.doubletake.com Double-Take Virtual Recovery Assistant • Protect physical or virtual servers directly into VMWare .VMDK files with real-time replication • Protect the entire server including the OS, applications and data • Protect multiple source servers with a single virtual target server • Failover automatically or manually within minutes • Lower TCO with virtualization and many-to-one consolidation. www.doubletake.com Virtual Recovery Assistant C: FS-System E: FS-Data DT-VRA DT-VRA C: C: System.vmdk System.vmdk FS-System.vmdk EX-System.vmdk C: FS-System.vmdk File Server C: E: EX-System EX-Data FS-Data.vmdk E: FS-Data.vmdk EX-Data.vmdk File Server EX-System.vmdk DB-System.vmdk EX-Data.vmdk DB-Data.vmdk Exchange DB-System.vmdk C: DB-System E: DB-Data DB-Data.vmdk Database www.doubletake.com How DTVI Works • Must be running ESX Server 3.0.0 and VMware VirtualCenter 2.0.0 • Leverages VMware APIs for virtual machine snapshot functionality • Snapshots include the entire VM (OS, Apps, Data) and can be used with a non-Windows Guest OS • Snapshots are time-coherent across all virtual disks configured for a protected virtual machine • Extends staging of virtual machines across geographical boundaries (WAN replication) www.doubletake.com How DTVI Works Administrative Client Web Services SSH SSH Monitoring (Time/Size) Source ESX Server Replica VM Files Source VM Files *.vmdk *-flat.vmdk *.vmx Target ESX Server Synchronizing (SCP) Committing (remove_snapshot) *-delta.vmdk *.vmsd Datastore (Source) Replicating (SCP) *-delta.vmdk *.vmsd Datastore (Target) www.doubletake.com Greg Saraydarian Financial Services Organization www.doubletake.com Customer Solution • Solution set for data protection and availability • Used: – Double-Take Replication – Double-Take Application Manager • Protecting/has protected several versions of Exchange Server www.doubletake.com Q&A www.doubletake.com Thanks! For More Information http://www.double-take.com You may close the webinar window at any time. www.doubletake.com