Transcript Document
Disaster Recovery – Beyond Backup Jason Phippen – Director Product and Solutions Marketing, EMEA VERITAS Confidential Agenda • • • • • • Disaster Recovery Concepts Backup – Last Line of Defence Enhancing Backup with Replication Remote Site Replication and Mirroring Clustering for Disaster Recovery Questions VERITAS Confidential Disaster Recovery Concepts Wks Days Hrs Mins Secs Recovery Point Secs Mins Hrs Days Wks Recovery Time • Recovery Point Objective (RPO) – Point in time to which applications data must be recovered to resume business transactions • Recovery Time Objective (RTO) – Maximum elapsed time allowed before lack of business function severely impacts an organization VERITAS Confidential Recovery Point Objective (RPO) Wks Days Hrs Mins Secs Recovery Point Secs Mins Hrs Days Recovery Time Replication Tape Backup w/ Offsite Vaulting • How much data loss can you endure? VERITAS Confidential Wks Recovery Time Objective (RTO) Wks Days Hrs Mins Secs Recovery Point Secs Mins Hrs Days Wks Recovery Time Geographic Clustering Recovery from Tape • How much downtime can you endure? VERITAS Confidential Choosing a Recovery Site • “Far Enough” away – How far away from the main site? – What resources should it have? • Site Strategies (Hot, Warm, Cold) • Considerations – – – – – Fault zones Flood plains Power grids Climate zones Locality relative to other sites (e.g., airport) – Remote customers and employees VERITAS Confidential Backup – Your last line of Defense • Redundant systems replicate user errors, viruses and data corruption • System or component redundancy (RAID, mirroring) cannot replace backup • Backup tapes may represent the last valid copy of data • Backups are your last line of defense against total data loss VERITAS Confidential Enhancing Backup with Replication VERITAS Confidential Replication-enhanced Backup • Replicating the Backup Catalog server – – – – Shave hours off a tape restore strategy No need to re-catalog tapes No need to rebuild the backup/restore server Tape restores can begin immediately Site A Site B Replicate Backup Catalogs Backup Clients VERITAS Confidential Backup Master/Media Server Backup Tape Copies Sent to Offsite Remote Site Replication and Mirroring VERITAS Confidential Replication and Mirroring Weeks Days Hours Minutes Seconds Recovery Point Asynchronous Synchronous Key Requirements… • Must be “far enough” away • No windows of data corruption at secondary VERITAS Confidential Synchronous Replication Primary Site Secondary Site 2 3 Strengths • Maximum data currency (RPO) • Data available immediately at secondary (RTO) 4 1 VERITAS Confidential Weaknesses • Potential to impact application performance • Data writes lag by network latency • Write commit latency across nodes Asynchronous Replication Primary Site Secondary Site 3 4 Strengths • Maximum performance • May have less application impact • Data available immediately at secondary (RTO) 2 1 Weaknesses • Secondary may lag primary (RPO) • Potential for data corruption (not a weakness for VERITAS) VERITAS Confidential Logical Volume Management Remote Mirroring Primary Site Application Volume Manager • Lower hardware costs Secondary Site – Groups physical disks into logical volumes – Hardware Independence, • Greater IT productivity – Simplified administration of heterogeneous environments – Proactive management of applications • Increased application ROI SAN Fabric • Can mirror over SAN distances VERITAS Confidential Clustering for Disaster Recovery VERITAS Confidential Clustering for Disaster Recovery Campus / MAN Disaster Recovery MAN WAN Disaster Recovery WAN OR Clustering, Remote Mirroring VERITAS Confidential Clustering , Replication Clustering, Replication, Global Clustering Campus / MAN Disaster Recovery St-r-e-t-c-h Cluster Over A SAN * Distance may vary depending upon infrastructure VERITAS Confidential Global Clustering • Geographically dispersed sites linked by public carrier wide area network • Each site aware of the configuration and state of all of the sites • Direct site level migration in event of catastrophe • Global Availability Management • Single point of monitoring and administration VERITAS Confidential Wide Area Availability Site Migration Failover Application Application Clustering Global Clustering Clustering Global Clustering Application Clustering Global Clustering Replication VERITAS Confidential VERITAS: Uniquely Qualified (HA and DR) Availability Requirements Local VERITAS Confidential Multi-site VERITAS Cluster Server VERITAS Global Cluster Manager Volume Manager/ Foundation Suite VERITAS Volume Replicator NetBackup/ Backup Exec - NetBackup Vault - BMR / IDR Questions VERITAS Confidential