Transcript Document

Disaster Recovery – Beyond
Backup
Jason Phippen – Director Product and
Solutions Marketing, EMEA
VERITAS Confidential
Agenda
•
•
•
•
•
•
Disaster Recovery Concepts
Backup – Last Line of Defence
Enhancing Backup with Replication
Remote Site Replication and Mirroring
Clustering for Disaster Recovery
Questions
VERITAS Confidential
Disaster Recovery Concepts
Wks
Days
Hrs
Mins
Secs
Recovery Point
Secs
Mins
Hrs
Days
Wks
Recovery Time
• Recovery Point Objective (RPO) –
Point in time to which applications data must be recovered to resume
business transactions
• Recovery Time Objective (RTO) –
Maximum elapsed time allowed before lack of business function severely
impacts an organization
VERITAS Confidential
Recovery Point Objective (RPO)
Wks
Days
Hrs
Mins
Secs
Recovery Point
Secs
Mins
Hrs
Days
Recovery Time
Replication
Tape Backup w/
Offsite Vaulting
• How much data loss can you endure?
VERITAS Confidential
Wks
Recovery Time Objective (RTO)
Wks
Days
Hrs
Mins
Secs
Recovery Point
Secs
Mins
Hrs
Days
Wks
Recovery Time
Geographic Clustering
Recovery from Tape
• How much downtime can you endure?
VERITAS Confidential
Choosing a Recovery Site
• “Far Enough” away
– How far away from the main site?
– What resources should it have?
• Site Strategies (Hot, Warm, Cold)
• Considerations
–
–
–
–
–
Fault zones
Flood plains
Power grids
Climate zones
Locality relative to other sites
(e.g., airport)
– Remote customers and employees
VERITAS Confidential
Backup – Your last line of Defense
• Redundant systems replicate user errors, viruses
and data corruption
• System or component redundancy (RAID,
mirroring) cannot replace backup
• Backup tapes may represent the last valid copy
of data
• Backups are your last line of defense against
total data loss
VERITAS Confidential
Enhancing Backup with
Replication
VERITAS Confidential
Replication-enhanced Backup
• Replicating the Backup Catalog server
–
–
–
–
Shave hours off a tape restore strategy
No need to re-catalog tapes
No need to rebuild the backup/restore server
Tape restores can begin immediately
Site A
Site B
Replicate Backup Catalogs
Backup
Clients
VERITAS Confidential
Backup
Master/Media
Server
Backup Tape Copies
Sent to Offsite
Remote Site Replication and
Mirroring
VERITAS Confidential
Replication and Mirroring
Weeks
Days
Hours
Minutes
Seconds
Recovery Point
Asynchronous
Synchronous
Key Requirements…
• Must be “far enough” away
• No windows of data
corruption at secondary
VERITAS Confidential
Synchronous Replication
Primary Site
Secondary Site
2
3
Strengths
• Maximum data currency (RPO)
• Data available immediately at secondary (RTO)
4
1
VERITAS Confidential
Weaknesses
• Potential to impact application performance
• Data writes lag by network latency
• Write commit latency across nodes
Asynchronous Replication
Primary Site
Secondary Site
3
4
Strengths
• Maximum performance
• May have less application impact
• Data available immediately at secondary (RTO)
2
1
Weaknesses
• Secondary may lag primary (RPO)
• Potential for data corruption
(not a weakness for VERITAS)
VERITAS Confidential
Logical Volume Management
Remote Mirroring
Primary Site
Application
Volume Manager
• Lower hardware costs
Secondary Site
– Groups physical disks into logical volumes
– Hardware Independence,
• Greater IT productivity
– Simplified administration of heterogeneous
environments
– Proactive management of applications
• Increased application ROI
SAN Fabric
• Can mirror over SAN distances
VERITAS Confidential
Clustering for Disaster
Recovery
VERITAS Confidential
Clustering for Disaster Recovery
Campus / MAN Disaster Recovery
MAN
WAN Disaster Recovery
WAN
OR
Clustering,
Remote Mirroring
VERITAS Confidential
Clustering ,
Replication
Clustering, Replication, Global Clustering
Campus / MAN Disaster Recovery
St-r-e-t-c-h Cluster Over A SAN
* Distance may vary
depending upon
infrastructure
VERITAS Confidential
Global Clustering
• Geographically dispersed sites linked by public carrier wide area
network
• Each site aware of the configuration and state of all of the sites
• Direct site level migration in event of catastrophe
• Global Availability Management
• Single point of monitoring and administration
VERITAS Confidential
Wide Area Availability
Site Migration
Failover
Application
Application
Clustering
Global
Clustering
Clustering
Global
Clustering
Application
Clustering
Global
Clustering
Replication
VERITAS Confidential
VERITAS: Uniquely Qualified (HA and DR)
Availability Requirements
Local
VERITAS Confidential
Multi-site
VERITAS
Cluster Server
VERITAS Global
Cluster Manager
Volume Manager/
Foundation Suite
VERITAS Volume
Replicator
NetBackup/
Backup Exec
- NetBackup Vault
- BMR / IDR
Questions
VERITAS Confidential