How To Recover From A Disaster On Linux (Amd64) On A Hard Disk Drive (Amd32) On An Uniden (Amd66) Or A Hard Drive (Oranium) On Your Computer (Orren) On The Same Computer (

Size: px
Start display at page:

Download "How To Recover From A Disaster On Linux (Amd64) On A Hard Disk Drive (Amd32) On An Uniden (Amd66) Or A Hard Drive (Oranium) On Your Computer (Orren) On The Same Computer ("

Transcription

1 Methods of Linux Bare Metal Restore and Disaster Recovery

2 STORIX WHITE PAPER 2 We don t think much about health insurance when we re feeling well, but even the least prudent planner wouldn t neglect such a necessity. As most of us know, problems occur when you least expect them. It is not a matter of if, it is a matter of when. A computer illness can sometimes be easily cured, while others are more serious. Think of disaster recovery software as more of an insurance policy-one that goes beyond recovering lost data. Most companies think they are prepared for disaster by backing up critical data, which they can quickly restore if a loss occurs. Few companies, however, are prepared for a catastrophe-total system failure-in which they lose all their data as well as the entire operating system, applications, settings, patches and more, reducing their system to bare metal. The META Group stated that, in 2002, system downtime cost American businesses an average of $1 million an hour. Unlike most UNIX flavors, many Linux distributions do not include disaster recovery (DR) tools. As a result, Linux users must often go back to their original distribution media and start building from scratch. Some third parties have developed disaster recovery utilities that have ways of recovering an entire Linux system. In the following discussion, two methods of system disaster recovery are examined: disk image recovery and file-level recovery using Storix System Backup Administrator (SBAdmin).

3 STORIX WHITE PAPER 3 The cost of downtime Rebuilding even a single system from scratch can take a few hours or several days time in which management, employees and customers have no data access. As a result there are no sales, no customer service, no product shipments, no supply chain management, no call centers... no revenue. How much does a single hour of downtime cost? The META Group stated that, in 2002, system downtime cost American businesses an average of $1 million an hour. A survey done by Contingency Planning Research and published in the April 3, 2000 issue of InternetWeek details hourly downtime losses for several industries: Industry Cost per hour Brokerage operations $6,450,000 Credit card authorization $2,600,000 Package shipping services $150,000 Catalog sales center $90,000 Airline reservation center $89,000 According to an Infonetics study on the effects of downtime, published the June 15, 2000 issue of CIO Magazine: 42% of companies lose $1,000 an hour 26% lose $10,000 an hour 5% lose up to $50,000 an hour 4% lose over $50,000 an hour 23% is unknown In today s 24x7 world, even if downtime is only $1,000 an hour, a three day shutdown would cost a company $72,000. At $10,000 an hour it would be $720,000. Few companies can survive such a hit. In fact, a chilling study from Contingency Planning and Management magazine discovered that 40% of companies that were shut down for three days failed within the following 36 months.

4 STORIX WHITE PAPER 4 Starting over Recovering from a bare metal disaster is a highly complex operation that can take hours, days or even weeks to return the system to its prior state. To understand the enormity of rebuilding an entire system from scratch, consider what is known (and not known) before restoration can commence. For example, does the company have: A list of user accounts and passwords handy? The names, types and attributes of all filesystems and how large they must be created to restore the data? Details of how all printers and display temrinals are configured? List of all network settings? Instructions for reinstalling all third-party applications? Assuming the administrator knows everything about a system at the time it crashed, he must still complete an arduous, step-by-step process to prepare the system before the actual application data can be restored. The most common tasks include: Repartition hard drives Recreate volume groups and logical volumes Remake software RAID devices Remake file systems Reinstall the Linux OS from the original distribution media Recreate users and groups Reinstall hardware drivers Reinstall additional packages and third party software Reinstall all software updates Reconfigure the network and firewall Redefine and reconfigure printers and other peripherals Reinstall and reconfigure web, FTP and servers Reinstall backup software Reinstall database software

5 STORIX WHITE PAPER 5 Linux system recovery tools? Some UNIX administrators, who routinely use recovery tools like AIX mksysb and HP/UX make_recovery, are reluctant to move to Linux because that OS has no similar standard tools for full-system recovery. In addition, most Linux distributions are fairly unsophisticated about how they install themselves. In most instances they use a single hard disk that is partitioned with a single root filesystem containing all system files as well as other applications and user data. In more sophisticated configurations, an administrator might take advantage of performance, flexibility and availability benefits by spending considerable time reorganizing the system to use LVM, software RAID, enhanced filesystem types and other advanced techniques. Unfortunately, all this time-consuming and costly hard work, which may evolve over several years, must be repeated if the system crashes or new hardware arrives. Fortunately, third party vendors are making tools available for Linux systems to ease this pain. Often referred to as system recovery, disaster recovery (DR) or bare-metal restore tools, they are capable of restoring a typical Linux system to its previous hardware configuration. Currently there are two methods of accomplishing this: disk image recovery and file level recovery. Each has its own benefits and pitfalls. Disk image recovery A disk image backup program views the hard drive simply as a group of sectors. It backs up all sectors (not individual files) on the hard drive containing the data and creates an exact image. By operating on the disk sector level, the program backs up everything-system files, master boot record (MBA), partition tables and all user data-with no regard to their content or structure. Some disk image backup tools, which are a bit more sophisticated, back the partition table information, then back up each partition independently as if it were a disk image. This adds a bit more flexibility by allowing IT to restore a single partition instead of the entire disk. A disk image restore begins by booting the system from media (typically a CD-ROM) that includes a simple OS, device drivers for accessing the disks and backup media, and a utility for rewriting the data. If the entire disk was backed up, then the entire disk s data is restored. If individual partitions were backed up, then the disk partition table is first re-created, then the data is restored to each partition. While in some instances this can provide the fastest means of backing up and restoring data, the method s inflexibility may cause considerable grief during a system restore. A disk image backup is like a block of ice that will only fit properly into its original container. If the container has changed (such as a different disk size, type or location), the data will no longer fit, and the entire backup is rendered unusable.

6 STORIX WHITE PAPER 6 DISK IMAGE BACKUP/RECOVERY Pros Fast backup if most of the sectors on the disk contain real data Simple, non-os-specific backup and restore process Cons Backup will take longer backing up sectors of the disk not used by real data Backup cannot be restored to different disk types, sizes or locations Cannot restore partial disk backup no selective file restore Restored data files retain same fragmentation as before the backup File-level system recovery In contrast to a disk image backup, a few backup tools and products are available that better understand the operating system they are running on. These tools generally record the system, disk and filesystem configuration, then use this information to rebuild the system from the ground up. The backup usually consists of a file-by-file backup of either the entire system or of each individual filesystem. Borrowing the previous analogy, if a disk image backup is like a block of ice, a file-level backup is like water; it can be shaped to fit into any container. As a result, disks, partitions, filesystems and other storage tools can be reconfigured for the new hardware, then data files can be simply restored onto the new configuration. It s like pouring water into a different glass; the data doesn t care about the storage configuration it is restored onto. This process of altering, then building a new storage configuration can be a sophisticated task in which most DR products show their limitations. Though most will allow alterations of disk partition tables, they fail to understand more advanced and increasingly common disk configuration tools such as the Logical Volume Manager (LVM) or Software RAID (meta-disks). These logical disks must also be altered to match the new hard disk configuration before the data can be restored. If the DR software is not capable of understanding and guiding the user through the process, it forces the user to manually alter and build the configuration, usually through command-line utilities and manual editing of configuration files. If all is well, the data files are restored and the system disk is made bootable once again. The new system, even with a new disk configuration, should operate the same (and often better) than the original.

7 STORIX WHITE PAPER 7 FILE-LEVEL SYSTEM BACKUP/RECOVERY Pros Faster backup when disk or filesystems contain free space Backup can be restored to different disk types, sizes and locations Faster system I/O after a recovery since all files are de-fragmented Cons Can take longer to read individual files from a full filesystem than image backup Depending on the utility, reconfiguration to new hardware may be complex. Takes longer to restore files and directories Selective restore of individual files and directories without complete recovery The best of both: Storix System Backup Administrator Storix, Inc. provides a daily backup management product with many features for both standalone systems and networked systems that some other backup products provide. The system backup and recovery features, however, set it aside from the rest. System Backup Administrator (SBAdmin) performs a file-level system backup capable of being restored onto different hardware while supporting all popular Linux storage configuration tools (e.g., LVM and Software Raid). SBAdmin backs up and restores virtually any Linux distribution regardless of disk complexity and I/O configuration. It fully understands both the original and new devices and adapters, and it automatically reconfigures the operating system to support them. The SBAdmin system installation process makes it easy for even the most inexperienced Linux administrator to reconfigure the system to match new hardware. The easy-to-use menu interface warns if the backup cannot be installed onto the new hardware without change. It then guides the administrator through the process of altering the configuration as needed, simplifying such complex tasks such as: Adding new disks to the configuration Adding or changing disk partition tables Adding disks or partitions (or software RAID devices) to volume groups Changing sizes, locations and striping of logical volumes Changing sizes, locations, striping and mirroring of software RAID devices

8 STORIX WHITE PAPER 8 Since many systems contain raw data that is not in a filesystem, SBAdmin will optionally backup any partition, logical volume or Software RAID device that does not contain filesystem data (or if filesystem is not mounted). In such an instance data is backed up and restored to the entire device, just as with other disk image backup tools. Since a Storix system backup is a file-level backup, it can also be used to restore individual files, filesystems or directories from the backup. And because the backup may also contain raw device data, the software can restore data to individual partitions, logical volumes or software RAID devices. Any selective data restore can be performed from the easy-to-use GUI interface. This eliminates the need to have separate backups for full system recovery and restoration of user files. Since SBAdmin recreates and restores the system from the ground up, there is virtually no fragmentation when the restore is completed. This often results in a considerable increase in I/O performance, even when no changes are made to the configuration. In addition, SBAdmin doesn t limit restoring a backup to the same hardware. Users can easily restore ( clone ) a single backup to different systems, even if the disks, adapters and other devices differ. Because SBAdmin allows reconfiguration to match new or different hardware, the same process can be used to configure the system for better performance and availability, even when no hardware change has occurred. This includes such tasks as: Converting a single root filesystem to multiple filesystems Resizing filesystems to add or free unused space Converting from partition-based file systems to LVM or Software RAID Extending or striping filesystems across disks Implementing RAID 1+0 (mirroring+striping) using both RAID and LVM Creating new volume groups and moving logical volumes between VGs The SBAdmin system installation process makes it easy for even the most inexperienced Linux administrator to reconfigure the system to match new hardware. Once the system is configured, the next SBAdmin System Backup performed will ensure the entire configuration is recorded and can be restored the next time with no user interaction.

9 STORIX WHITE PAPER 9 Conclusion When a system is down, regardless of whether it s a single disk, server or an entire IT center, business comes to a halt. Workers sit idle, sales aren t made, orders aren t filled, customers can t access the company website. Using a disk image restore program is a fast, easy method for bare metal recovery if everything is restored exactly as the original system was before it went down. However, if there are any unexpected changes (such as disk or system alterations), the backup may be rendered useless. If there is no guarantee that a system replacement will exactly match the original, a system backup such as Storix System Backup Administrator is a better solution. Regardless of the product selected, users must be absolutely sure it will recognize, support and rebuild all of the storage options that have been implemented. Whenever possible, a disaster recovery test should be fully performed. Businesses shouldn t wait until disaster strikes to find out whether or not they made the right choice. Storix, Inc Mission Center Ct Suite 320 San Diego, CA sba@storix.com

Adaptable System Recovery (ASR) for Linux. How to Restore Backups onto Hardware that May not be Identical to the Original System

Adaptable System Recovery (ASR) for Linux. How to Restore Backups onto Hardware that May not be Identical to the Original System Adaptable System Recovery (ASR) for Linux How to Restore Backups onto Hardware that May not be Identical to the Original System Storix, Inc. 7801 Mission Center Ct. Ste. 250 San Diego, CA 92108 1-619-543-0200

More information

VERITAS Backup Exec 9.1 for Windows Servers. Intelligent Disaster Recovery Option

VERITAS Backup Exec 9.1 for Windows Servers. Intelligent Disaster Recovery Option WHITE PAPER Intelligent Disaster Recovery VERITAS Backup Exec 9.1 for Windows Servers Intelligent Disaster Recovery Option 11/20/2003 1 TABLE OF CONTENTS Introduction...3 Solution: Point-in-Time Disaster

More information

A Better Approach to Backup and Bare-Metal Restore: Disk Imaging Technology

A Better Approach to Backup and Bare-Metal Restore: Disk Imaging Technology A Better Approach to Backup and Bare-Metal Restore: Disk Imaging Technology Acronis True Image Enterprise Server for Windows Acronis True Image Server for Windows Acronis True Image Server for Linux Another

More information

Maximizing Business Continuity and Minimizing Recovery Time Objectives in Windows Server Environments

Maximizing Business Continuity and Minimizing Recovery Time Objectives in Windows Server Environments Maximizing Business Continuity and Minimizing Recovery Time Objectives in Windows Server Environments StorageCraft Technology Corporation Backup Fast, Recover Faster 2010 StorageCraft Technology Corporation.

More information

Strategies for Bare Machine Recovery

Strategies for Bare Machine Recovery Strategies for Bare Machine Recovery Protecting Your Mission-Critical Servers Differing BMR Strategies System reinstallation Full system reinstallation using installation CDs (Windows and ITSM client)

More information

RAID Utility User Guide. Instructions for setting up RAID volumes on a computer with a Mac Pro RAID Card or Xserve RAID Card

RAID Utility User Guide. Instructions for setting up RAID volumes on a computer with a Mac Pro RAID Card or Xserve RAID Card RAID Utility User Guide Instructions for setting up RAID volumes on a computer with a Mac Pro RAID Card or Xserve RAID Card Contents 3 RAID Utility User Guide 3 The RAID Utility Window 4 Running RAID Utility

More information

Veritas Volume Manager Administration on HP-UX Course Summary

Veritas Volume Manager Administration on HP-UX Course Summary Veritas Volume Manager Administration on HP-UX Course Summary Contact Us: (616) 875-4060 Length: Classroom: 4 days Virtual: 6 hrs/day - 5 days Prerequisite: HP-UX System and Network Administration I and

More information

STORAGECRAFT SHADOWPROTECT 5 SERVER/SMALL BUSINESS SERVER

STORAGECRAFT SHADOWPROTECT 5 SERVER/SMALL BUSINESS SERVER STORAGECRAFT SHADOWPROTECT 5 SERVER/SMALL BUSINESS SERVER PRODUCT BRIEF 1 THE CHALLENGE OF BUSINESS CONTINUITY Maximizing business continuity while minimizing business disruption can be especially challenging

More information

Disaster Recovery. Maximizing Business Continuity and Minimizing Recovery Time Objectives in Windows Server Environments.

Disaster Recovery. Maximizing Business Continuity and Minimizing Recovery Time Objectives in Windows Server Environments. Disaster Recovery Maximizing Business Continuity and Minimizing Recovery Time Objectives in Windows Server Environments Executive Summary TechAdvisory.org SME Reports sponsored by D-Net is your partner

More information

Intelligent disaster recovery. Dell DL backup to Disk Appliance powered by Symantec

Intelligent disaster recovery. Dell DL backup to Disk Appliance powered by Symantec Intelligent disaster recovery Dell DL backup to Disk Appliance powered by Symantec The PowerVault DL Backup to Disk Appliance Powered by Symantec Backup Exec offers the industry s only fully integrated

More information

Oracle VM Server Recovery Guide. Version 8.2

Oracle VM Server Recovery Guide. Version 8.2 Oracle VM Server Recovery Guide Version 8.2 Oracle VM Server for x86 Recovery Guide The purpose of this document is to provide the steps necessary to perform system recovery of an Oracle VM Server for

More information

Symantec NetBackup 7 Clients and Agents

Symantec NetBackup 7 Clients and Agents Complete protection for your information-driven enterprise Overview Symantec NetBackup provides a simple yet comprehensive selection of innovative clients and agents to optimize the performance and efficiency

More information

One Solution for Real-Time Data protection, Disaster Recovery & Migration

One Solution for Real-Time Data protection, Disaster Recovery & Migration One Solution for Real-Time Data protection, Disaster Recovery & Migration Built-in standby virtualisation server Backs up every 15 minutes up to 12 servers On and Off-site Backup User initialed file, folder

More information

Backup and Disaster Recovery Software for Microsoft Windows Servers

Backup and Disaster Recovery Software for Microsoft Windows Servers Backup and Disaster Recovery Software for Microsoft Windows Servers Five Strategic Considerations Investment Protection For many companies, the life-blood of their business is corporate data. Protecting

More information

Week Overview. Installing Linux Linux on your Desktop Virtualization Basic Linux system administration

Week Overview. Installing Linux Linux on your Desktop Virtualization Basic Linux system administration ULI101 Week 06b Week Overview Installing Linux Linux on your Desktop Virtualization Basic Linux system administration Installing Linux Standalone installation Linux is the only OS on the computer Any existing

More information

RAID HARDWARE. On board SATA RAID controller. RAID drive caddy (hot swappable) SATA RAID controller card. Anne Watson 1

RAID HARDWARE. On board SATA RAID controller. RAID drive caddy (hot swappable) SATA RAID controller card. Anne Watson 1 RAID HARDWARE On board SATA RAID controller SATA RAID controller card RAID drive caddy (hot swappable) Anne Watson 1 RAID The word redundant means an unnecessary repetition. The word array means a lineup.

More information

WINDOWS AZURE EXECUTION MODELS

WINDOWS AZURE EXECUTION MODELS WINDOWS AZURE EXECUTION MODELS Windows Azure provides three different execution models for running applications: Virtual Machines, Web Sites, and Cloud Services. Each one provides a different set of services,

More information

Virtual Disaster Recovery

Virtual Disaster Recovery Virtual Disaster Recovery White Paper September 16, 2008 Kelly Laughton Davenport Group Consultant Davenport Group 2008. All rights reserved. Introduction Today s data center has evolved into a complex,

More information

SCHEDULE A DEMO BACKUP AND RECOVERY. deliver true Business Continuity in one, powerful, integrated system.

SCHEDULE A DEMO BACKUP AND RECOVERY. deliver true Business Continuity in one, powerful, integrated system. deliver true Business Continuity in one, powerful, integrated system. Protect Your Business: instantly restore entire systems, email boxes, databases in minutes Backups Verified: each backup is verified

More information

Protecting Virtual Servers with Acronis True Image

Protecting Virtual Servers with Acronis True Image Protecting Virtual Servers with Acronis True Image Protecting Virtual Servers with Acronis True Image In This Paper Protecting Virtual Servers with Acronis True Image...3 Virtual Machines: The Data Protection

More information

Availability Digest. Unix Backup and Recovery. February 2007

Availability Digest. Unix Backup and Recovery. February 2007 the Availability Digest Unix Backup and Recovery February 2007 Backing up is a pain. But it is the restore that counts. This is the message that Curtis Preston delivers in his book, Unix Backup and Recovery.

More information

Simplifying Server Workload Migrations

Simplifying Server Workload Migrations Simplifying Server Workload Migrations This document describes the migration challenges that organizations face and how the Acronis AnyData Engine supports physical-to-physical (P2P), physical-to-virtual

More information

Leveraging Virtualization for Disaster Recovery in Your Growing Business

Leveraging Virtualization for Disaster Recovery in Your Growing Business Leveraging Virtualization for Disaster Recovery in Your Growing Business Contents What is Disaster Recovery?..................................... 2 Leveraging Virtualization to Significantly Improve Disaster

More information

Dell AppAssure Universal Recovery

Dell AppAssure Universal Recovery Technology spotlight Dell AppAssure Universal Recovery The key to unlimited cross-platform restoration flexibility Universal Recovery is a built-in Dell AppAssure tool for recovering whole physical machines,

More information

Strategies for Bare Machine Recovery

Strategies for Bare Machine Recovery Strategies for Bare Machine Recovery September 2003 2003 Cristie Data Products What Is Bare Machine Recovery? The ability to recover the operating system of a machine to the identical state it was at a

More information

RAID Utility User s Guide Instructions for setting up RAID volumes on a computer with a MacPro RAID Card or Xserve RAID Card.

RAID Utility User s Guide Instructions for setting up RAID volumes on a computer with a MacPro RAID Card or Xserve RAID Card. RAID Utility User s Guide Instructions for setting up RAID volumes on a computer with a MacPro RAID Card or Xserve RAID Card. 1 Contents 3 RAID Utility User s Guide 3 Installing the RAID Software 4 Running

More information

HP-UX System and Network Administration for Experienced UNIX System Administrators Course Summary

HP-UX System and Network Administration for Experienced UNIX System Administrators Course Summary Contact Us: (616) 875-4060 HP-UX System and Network Administration for Experienced UNIX System Administrators Course Summary Length: Classroom: 5 days Virtual: 6 hrs/day - 5 days Prerequisite: System Administration

More information

Disaster Recovery Strategies: Business Continuity through Remote Backup Replication

Disaster Recovery Strategies: Business Continuity through Remote Backup Replication W H I T E P A P E R S O L U T I O N : D I S A S T E R R E C O V E R Y T E C H N O L O G Y : R E M O T E R E P L I C A T I O N Disaster Recovery Strategies: Business Continuity through Remote Backup Replication

More information

VERITAS Backup Exec 10 for Windows Servers. Intelligent Disaster Recovery Option

VERITAS Backup Exec 10 for Windows Servers. Intelligent Disaster Recovery Option WHITE PAPER Intelligent Disaster Recovery VERITAS Backup Exec 10 for Windows Servers Intelligent Disaster Recovery Option 1/17/2005 1 TABLE OF CONTENTS Executive Summary...3 Disaster Preparation Plan (DPP)...4

More information

Every organization has critical data that it can t live without. When a disaster strikes, how long can your business survive without access to its

Every organization has critical data that it can t live without. When a disaster strikes, how long can your business survive without access to its DISASTER RECOVERY STRATEGIES: BUSINESS CONTINUITY THROUGH REMOTE BACKUP REPLICATION Every organization has critical data that it can t live without. When a disaster strikes, how long can your business

More information

Backup and Recovery FAQs

Backup and Recovery FAQs May 2013 Page 1 This document answers frequently asked questions regarding the Emerson system Backup and Recovery application. www.deltav.com May 2013 Page 2 Table of Contents Introduction... 6 General

More information

Fast and Simple Disaster Recovery with Syncsort ExpressDR White Paper

Fast and Simple Disaster Recovery with Syncsort ExpressDR White Paper Fast and Simple Disaster Recovery with Syncsort ExpressDR White Paper bex30101807wpdr Fast and Simple Disaster Recovery with Syncsort ExpressDR Introduction Meltdown! One of your servers a critical component

More information

Data Integrity: Backups and RAID

Data Integrity: Backups and RAID Data Integrity: Backups and RAID Introduction Keeping your data safe and reliable TM Backups Types of backups Strategy Tools RAID (Redundant Array of Independent Disks) Types of RAID What type to Use Disk

More information

WHITE PAPER. VERITAS Bare Metal Restore AUTOMATED SYSTEM RECOVERY WITH VERITAS NETBACKUP

WHITE PAPER. VERITAS Bare Metal Restore AUTOMATED SYSTEM RECOVERY WITH VERITAS NETBACKUP WHITE PAPER VERITAS Bare Metal Restore AUTOMATED SYSTEM RECOVERY WITH VERITAS NETBACKUP 1 INTRODUCTION...3 CURRENT METHODS FALL SHORT...3 THE REINSTALL-AND-RESTORE METHOD...3 Uncertain Recovery State...3

More information

Near-Instant Oracle Cloning with Syncsort AdvancedClient Technologies White Paper

Near-Instant Oracle Cloning with Syncsort AdvancedClient Technologies White Paper Near-Instant Oracle Cloning with Syncsort AdvancedClient Technologies White Paper bex30102507wpor Near-Instant Oracle Cloning with Syncsort AdvancedClient Technologies Introduction Are you a database administrator

More information

NBU651 BMR. Avi Weinberger

NBU651 BMR. Avi Weinberger NBU651 BMR Avi Weinberger Bare Metal Restore Overview BMR automates system recovery by restoring the operating system, the system configuration, and all system and data files with two steps: Run one command

More information

White Paper A New RAID Configuration for Rimage Professional 5410N and Producer IV Systems November 2012

White Paper A New RAID Configuration for Rimage Professional 5410N and Producer IV Systems November 2012 White Paper A New RAID Configuration for Rimage November 2012 Combining RAID 5 and RAID 0 to Reduce the Impact of Hard Drive Failures Rimage is changing the hard drive layout and RAID configurations for

More information

Tivoli Storage Manager Lunch and Learn Bare Metal Restore Dave Daun, IBM Advanced Technical Support

Tivoli Storage Manager Lunch and Learn Bare Metal Restore Dave Daun, IBM Advanced Technical Support IBM Software Group Tivoli Storage Manager Lunch and Learn Bare Metal Restore Dave Daun, IBM Advanced Technical Support July, 2003 Advanced Technical Support Agenda Bare Metal Restore Basics Windows Automated

More information

How To Handle A Disaster Recovery Plan

How To Handle A Disaster Recovery Plan Page 1 of 9 Policy Statement CSB Policy And Procedures The equipment, software systems, and databases that comprise the ephi System are critical components that enable the [CSB] to function in an effective

More information

10 Things Your Data Center Backup Solution Should Do. Reliable, fast and easy backup is only the beginning

10 Things Your Data Center Backup Solution Should Do. Reliable, fast and easy backup is only the beginning 10 Things Your Data Center Backup Solution Should Do Reliable, fast and easy backup is only the beginning Table of Contents Ten Things Your Data Center Backup Should Do 1 #1: Reduce Hours Spent on Backup

More information

Protecting Virtual Servers with Acronis True Image Echo

Protecting Virtual Servers with Acronis True Image Echo Protecting Virtual Servers with Acronis True Image Echo IT organizations have discovered that virtualization technology can simplify server management and reduce total operating costs. Despite the technical

More information

How To Choose An Online Backup Solution

How To Choose An Online Backup Solution d The Dirty Little Secret About Online Backup How to Evaluate Online Backup for Business Authored by: David A. Kelly and Heather Ashton Upside Research, Inc. www.upsideresearch.com Executive Summary How

More information

Other trademarks and Registered trademarks include: LONE-TAR. AIR-BAG. RESCUE-RANGER TAPE-TELL. CRONY. BUTTSAVER. SHELL-LOCK

Other trademarks and Registered trademarks include: LONE-TAR. AIR-BAG. RESCUE-RANGER TAPE-TELL. CRONY. BUTTSAVER. SHELL-LOCK Quick Start Guide Copyright Statement Copyright Lone Star Software Corp. 1983-2013 ALL RIGHTS RESERVED. All content viewable or accessible from this guide is the sole property of Lone Star Software Corp.

More information

High Availability and Disaster Recovery for Exchange Servers Through a Mailbox Replication Approach

High Availability and Disaster Recovery for Exchange Servers Through a Mailbox Replication Approach High Availability and Disaster Recovery for Exchange Servers Through a Mailbox Replication Approach Introduction Email is becoming ubiquitous and has become the standard tool for communication in many

More information

How To Use A Recoverypoint Server Appliance For A Disaster Recovery

How To Use A Recoverypoint Server Appliance For A Disaster Recovery One Solution for Real-Time Data protection, Disaster Recovery & Migration Built-in standby virtualisation server Backs up every 15 minutes up to 12 servers On and Off-site Backup Exchange Mailbox & Message

More information

Instant Recovery for VMware

Instant Recovery for VMware NETBACKUP 7.6 FEATURE BRIEFING INSTANT RECOVERY FOR VMWARE NetBackup 7.6 Feature Briefing Instant Recovery for VMware Version number: 1.0 Issue date: 2 nd August 2013 This document describes a feature

More information

HP Data Protector Express Single Server Edition technical white paper

HP Data Protector Express Single Server Edition technical white paper HP Data Protector Express Single Server Edition technical white paper Backup and recovery software exclusively for StorageWorks tape drives and tape autoloaders Table of contents Introduction... 2 Why

More information

Ubuntu Linux Reza Ghaffaripour May 2008

Ubuntu Linux Reza Ghaffaripour May 2008 Ubuntu Linux Reza Ghaffaripour May 2008 Table of Contents What is Ubuntu... 3 How to get Ubuntu... 3 Ubuntu Features... 3 Linux Advantages... 4 Cost... 4 Security... 4 Choice... 4 Software... 4 Hardware...

More information

Business Virtualization

Business Virtualization Business Virtualization Why should I consider server virtualization? Save money. Often servers are dedicated to just one or two applications. As a result servers in many organizations are only using 15

More information

Installing a Second Operating System

Installing a Second Operating System Installing a Second Operating System Click a link below to view one of the following sections: Overview Key Terms and Information Operating Systems and File Systems Managing Multiple Operating Systems

More information

StorageCraft Technology Corporation Leading the Way to Safer Computing 2004-2009 StorageCraft Technology Corporation. All Rights Reserved.

StorageCraft Technology Corporation Leading the Way to Safer Computing 2004-2009 StorageCraft Technology Corporation. All Rights Reserved. PRODUCT SCENARIOS Introduction Fast and reliable online backup and bare metal recovery for Windows servers ShadowProtect Server Edition creates an exact point-in-time backup of your entire server or specific

More information

Click to view Web Link, click Chapter 8, Click Web Link from left navigation, then click BIOS below Chapter 8 p. 395 Fig. 8-4.

Click to view Web Link, click Chapter 8, Click Web Link from left navigation, then click BIOS below Chapter 8 p. 395 Fig. 8-4. Chapter 8 Objectives Chapter 8 Operating Systems and Utility Programs Identify the the types types of of system software Summarize the the startup process on on a a personal computer Describe the the functions

More information

Backup & Disaster Recovery Options

Backup & Disaster Recovery Options Backup & Disaster Recovery Options Since businesses have become more dependent on their internal computing capability, they are increasingly concerned about recovering from equipment failure, human error,

More information

WHITE PAPER: ENTERPRISE SOLUTIONS. Veritas NetBackup Bare Metal Restore by Symantec Best-of-Breed Server Recovery Using Veritas NetBackup Version 6.

WHITE PAPER: ENTERPRISE SOLUTIONS. Veritas NetBackup Bare Metal Restore by Symantec Best-of-Breed Server Recovery Using Veritas NetBackup Version 6. WHITE PAPER: ENTERPRISE SOLUTIONS Veritas NetBackup Bare Metal Restore by Symantec Best-of-Breed Server Recovery Using Veritas NetBackup Version 6.0 White Paper: Enterprise Solutions Veritas NetBackup

More information

BARE METAL DISASTER RECOVERY

BARE METAL DISASTER RECOVERY WHITE PAPER BARE METAL DISASTER RECOVERY Filling the Gap in Backup Protection INTRODUCTION Since the beginning of the computing age, it has been universally understood that backup is a critical element

More information

Total Backup Recovery

Total Backup Recovery Total Backup Recovery Ultimate Backup & Recovery Solution for Businesses & Organizations Total Backup Recovery 7 Series is a total backup and recovery solution for businesses and organizations. The series

More information

Backup and Recovery. Backup and Recovery. Introduction. DeltaV Product Data Sheet. Best-in-class offering. Easy-to-use Backup and Recovery solution

Backup and Recovery. Backup and Recovery. Introduction. DeltaV Product Data Sheet. Best-in-class offering. Easy-to-use Backup and Recovery solution September 2013 Page 1 Protect your plant data with the solution. Best-in-class offering Easy-to-use solution Data protection and disaster recovery in a single solution Scalable architecture and functionality

More information

Library Recovery Center

Library Recovery Center Library Recovery Center Ever since libraries began storing bibliographic information on magnetic disks back in the 70 s, the challenge of creating useful back-ups and preparing for a disaster recovery

More information

VERITAS File Server Edition Turning Commodity Hardware into High Performance, Highly Available File Servers

VERITAS File Server Edition Turning Commodity Hardware into High Performance, Highly Available File Servers VERITAS File Server Edition Turning Commodity Hardware into High Performance, Highly Available File Servers Table of Contents The VERITAS File Server Edition...1 What is an Edition?...2 File Server Edition

More information

VERITAS NetBackup BusinesServer

VERITAS NetBackup BusinesServer VERITAS NetBackup BusinesServer A Scalable Backup Solution for UNIX or Heterogeneous Workgroups V E R I T A S W H I T E P A P E R Table of Contents Overview...................................................................................1

More information

Acronis Backup & Recovery 10 Workstation. Installation Guide

Acronis Backup & Recovery 10 Workstation. Installation Guide Acronis Backup & Recovery 10 Workstation Installation Guide Table of Contents 1. Installation of Acronis Backup & Recovery 10... 3 1.1. Acronis Backup & Recovery 10 components... 3 1.1.1. Agent for Windows...

More information

TABLE OF CONTENTS. xiii. Preface. I. Introduction 1. 1. Preparing for the Worst 3. My Dad Was Right 3. Developing a Disaster Recovery Plan 4

TABLE OF CONTENTS. xiii. Preface. I. Introduction 1. 1. Preparing for the Worst 3. My Dad Was Right 3. Developing a Disaster Recovery Plan 4 Page v This book is dedicated to my lovely wife Celynn, my beautiful daughters Nina and Marissa, and to God, for continuing to bless my life with gifts such as these. -W. Curtis Preston Page vii TABLE

More information

Centralize AIX LPAR and Server Management With NIM

Centralize AIX LPAR and Server Management With NIM Page 1 of 6 close window Print Centralize AIX LPAR and Server Management With NIM June July 2009 by Jaqui Lynch Available Downloads: Code Sample 1 Code Sample 2 NIM Resources In a previous article, Simplifying

More information

Lotus Domino Backup Strategy

Lotus Domino Backup Strategy Lotus Domino Backup Strategy Introduction LOTUS DOMINO BACKUP STRATEGY White Paper 1 You've worked hard to put your Domino security shield in place. You've set up your firewall, Access Control Lists, and

More information

for the VaultDR Online Plugin for Linux-based Operating Systems

for the VaultDR Online Plugin for Linux-based Operating Systems Redefining Data Protection Title Page User s Guide for the VaultDR Online Plugin for Linux-based Operating Systems NVE 7009-36B 01/19-07 Copyrights NetVault:Backup - User s Guide for the VaultDR Online

More information

Overview of I/O Performance and RAID in an RDBMS Environment. By: Edward Whalen Performance Tuning Corporation

Overview of I/O Performance and RAID in an RDBMS Environment. By: Edward Whalen Performance Tuning Corporation Overview of I/O Performance and RAID in an RDBMS Environment By: Edward Whalen Performance Tuning Corporation Abstract This paper covers the fundamentals of I/O topics and an overview of RAID levels commonly

More information

VERITAS Storage Foundation 4.3 for Windows

VERITAS Storage Foundation 4.3 for Windows DATASHEET VERITAS Storage Foundation 4.3 for Windows Advanced Volume Management Technology for Windows In distributed client/server environments, users demand that databases, mission-critical applications

More information

VERITAS Backup Exec 9.0 for Windows Servers

VERITAS Backup Exec 9.0 for Windows Servers WHITE PAPER Data Protection Solutions for Network Attached Storage VERITAS Backup Exec 9.0 for Windows Servers VERSION INCLUDES TABLE OF CONTENTS STYLES 1 TABLE OF CONTENTS Background...3 Why Use a NAS

More information

VMware and VSS: Application Backup and Recovery

VMware and VSS: Application Backup and Recovery Best Tools : VMware ESX Virtualization Management VMware and VSS: Application Backup and Recovery Written by: Anton Gostev Product Manager Veeam Software CONTENTS EXECUTIVE SUMMARY... 3 VSS AWARE BACKUP

More information

Acronis Disk Director 11 Advanced Server. Quick Start Guide

Acronis Disk Director 11 Advanced Server. Quick Start Guide Acronis Disk Director 11 Advanced Server Quick Start Guide Copyright Acronis, Inc., 2000-2010. All rights reserved. Acronis and Acronis Secure Zone are registered trademarks of Acronis, Inc. "Acronis Compute

More information

Update: About Apple RAID Version 1.5 About this update

Update: About Apple RAID Version 1.5 About this update apple Update: About Apple RAID Version 1.5 About this update This update describes new features and capabilities of Apple RAID Software version 1.5, which includes improvements that increase the performance

More information

Acronis Backup & Recovery 10 Server for Windows. Installation Guide

Acronis Backup & Recovery 10 Server for Windows. Installation Guide Acronis Backup & Recovery 10 Server for Windows Installation Guide Table of Contents 1. Installation of Acronis Backup & Recovery 10... 3 1.1. Acronis Backup & Recovery 10 components... 3 1.1.1. Agent

More information

Paragon Drive Backup Server Edition

Paragon Drive Backup Server Edition Solution Approach Paragon Drive Backup Server Edition Table of Contents 1 Introduction 2 The Cost of Data Loss 3 Paragon Software as a Backup Utility Provider 4 Cost Savings With Paragon Software 5 How

More information

Retrospect 7.7 User s Guide Addendum

Retrospect 7.7 User s Guide Addendum Retrospect 7.7 User s Guide Addendum 2011 Retrospect, Inc. All rights reserved. Retrospect 7.7 Users Guide Addendum, first edition. Use of this product (the Software ) is subject to acceptance of the license

More information

OVERVIEW. CEP Cluster Server is Ideal For: First-time users who want to make applications highly available

OVERVIEW. CEP Cluster Server is Ideal For: First-time users who want to make applications highly available Phone: (603)883-7979 sales@cepoint.com Cepoint Cluster Server CEP Cluster Server turnkey system. ENTERPRISE HIGH AVAILABILITY, High performance and very reliable Super Computing Solution for heterogeneous

More information

Backup Manager Configuration and Deployment Guide. Version 9.1

Backup Manager Configuration and Deployment Guide. Version 9.1 Backup Manager Configuration and Deployment Guide Version 9.1 Contents Backup Manager 3 Backup Manager Support 9 Backup Manager Configuration and Deployment 14 Defining a Backup Manager Profile 14 Configuring

More information

Dell NetVault Bare Metal Recovery 10.5. User s Guide

Dell NetVault Bare Metal Recovery 10.5. User s Guide Dell NetVault Bare Metal Recovery 10.5 User s Guide Copyright 2015 Dell Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual property laws. Dell, the

More information

Achieving High Availability & Rapid Disaster Recovery in a Microsoft Exchange IP SAN April 2006

Achieving High Availability & Rapid Disaster Recovery in a Microsoft Exchange IP SAN April 2006 Achieving High Availability & Rapid Disaster Recovery in a Microsoft Exchange IP SAN April 2006 All trademark names are the property of their respective companies. This publication contains opinions of

More information

Disk-to-Disk-to-Offsite Backups for SMBs with Retrospect

Disk-to-Disk-to-Offsite Backups for SMBs with Retrospect Disk-to-Disk-to-Offsite Backups for SMBs with Retrospect Abstract Retrospect backup and recovery software provides a quick, reliable, easy-to-manage disk-to-disk-to-offsite backup solution for SMBs. Use

More information

June 2009. Blade.org 2009 ALL RIGHTS RESERVED

June 2009. Blade.org 2009 ALL RIGHTS RESERVED Contributions for this vendor neutral technology paper have been provided by Blade.org members including NetApp, BLADE Network Technologies, and Double-Take Software. June 2009 Blade.org 2009 ALL RIGHTS

More information

How would lost data impact your business? What you don t know could hurt you. NETWORK ATTACHED STORAGE FOR SMALL BUSINESS

How would lost data impact your business? What you don t know could hurt you. NETWORK ATTACHED STORAGE FOR SMALL BUSINESS How would lost data impact your business? What you don t know could hurt you. NETWORK ATTACHED STORAGE FOR SMALL BUSINESS How would lost data impact your business? What you don t know could hurt you You

More information

Acronis Backup & Recovery 10 Server for Windows. Installation Guide

Acronis Backup & Recovery 10 Server for Windows. Installation Guide Acronis Backup & Recovery 10 Server for Windows Installation Guide Table of Contents 1. Installation of Acronis Backup & Recovery 10... 3 1.1. Acronis Backup & Recovery 10 components... 3 1.1.1. Agent

More information

Tape or Disk Backup Which is Best?

Tape or Disk Backup Which is Best? WHITE PAPER Disk-to-Disk-to-Tape Strategy Guide How often are we reminded that what goes around comes around? This can be said for the fashion industry, but does it hold true for technology? It does, and

More information

Secure Your Business with EVault Cloud-Connected Solutions

Secure Your Business with EVault Cloud-Connected Solutions Secure Your Business with EVault Cloud-Connected Solutions Winfried Posthumus Channel Sales Manager NL Winfried.Posthumus@evault.com 11/22/2012 2012 EVault, Inc. All Rights Reserved 1 Agenda Who is EVault

More information

Tiburon Master Support Agreement Exhibit 6 Back Up Schedule & Procedures. General Notes on Backups

Tiburon Master Support Agreement Exhibit 6 Back Up Schedule & Procedures. General Notes on Backups General Notes on Backups This document describes the procedures to backup the minimum set of files required to recover application and/or data files in the event of a hardware failure or data loss. These

More information

Optimizing Data Protection Operations in VMware Environments

Optimizing Data Protection Operations in VMware Environments Optimizing Data Protection Operations in VMware Environments March 2009 Data protection is critical for small and medium business (SMB) customers. Evolving business and regulatory mandates are driving

More information

SIRIS. Bare Metal Restore Guide

SIRIS. Bare Metal Restore Guide SIRIS Bare Metal Restore Guide Table of Contents Prerequisites 5 PXE Boot Configuration 6 Accessing Recovery Points 7 Setting BMR Preferences 9 gpxe USB Drive Configuration 10 Starting the BMR 11 Configuring

More information

3.2 Install, configure, optimize and upgrade operating systems references to upgrading from Windows 95 and NT may be made

3.2 Install, configure, optimize and upgrade operating systems references to upgrading from Windows 95 and NT may be made Page 1 of 7 Jeff has 27 workstations that need to have a clean installation of Windows 2000 Professional placed on them by the end of the week. Which imaging tool should he use? Xcopy Clone i Sysprep Prepsys

More information

PARALLELS SERVER BARE METAL 5.0 README

PARALLELS SERVER BARE METAL 5.0 README PARALLELS SERVER BARE METAL 5.0 README 1999-2011 Parallels Holdings, Ltd. and its affiliates. All rights reserved. This document provides the first-priority information on the Parallels Server Bare Metal

More information

AVLOR SERVER CLOUD RECOVERY

AVLOR SERVER CLOUD RECOVERY AVLOR SERVER CLOUD RECOVERY WHITE PAPER 1 Table of Contents Abstract... 2 1. Introduction... 3 2. Server Cloud Recovery... 3 3. Amazon AWS Cloud... 4 a. What it is... 4 b. Why Use AWS?... 5 4. Difficulties

More information

Acronis Backup & Recovery for Mac. Acronis Backup & Recovery & Acronis ExtremeZ-IP REFERENCE ARCHITECTURE

Acronis Backup & Recovery for Mac. Acronis Backup & Recovery & Acronis ExtremeZ-IP REFERENCE ARCHITECTURE Acronis Backup & Recovery for Mac Acronis Backup & Recovery & Acronis ExtremeZ-IP This document describes the technical requirements and best practices for implementation of a disaster recovery solution

More information

Backups and Maintenance

Backups and Maintenance Backups and Maintenance Backups and Maintenance Objectives Learn how to create a backup strategy to suit your needs. Learn how to back up a database. Learn how to restore from a backup. Use the Database

More information

2-Bay Raid Sub-System Smart Removable 3.5" SATA Multiple Bay Data Storage Device User's Manual

2-Bay Raid Sub-System Smart Removable 3.5 SATA Multiple Bay Data Storage Device User's Manual 2-Bay Raid Sub-System Smart Removable 3.5" SATA Multiple Bay Data Storage Device User's Manual www.vipower.com Table of Contents 1. How the SteelVine (VPMP-75211R/VPMA-75211R) Operates... 1 1-1 SteelVine

More information

BrightStor ARCserve Backup for UNIX

BrightStor ARCserve Backup for UNIX BrightStor ARCserve Backup for UNIX Disaster Recovery Option Guide r11.5 D01200-1E This documentation and related computer software program (hereinafter referred to as the "Documentation") is for the end

More information

The Essential Guide for Protecting Your Legal Practice From IT Downtime

The Essential Guide for Protecting Your Legal Practice From IT Downtime The Essential Guide for Protecting Your Legal Practice From IT Downtime www.axcient.com Introduction: Technology in the Legal Practice In the professional services industry, the key deliverable of a project

More information

RAID5 versus RAID10. First let's get on the same page so we're all talking about apples.

RAID5 versus RAID10. First let's get on the same page so we're all talking about apples. RAID5 versus RAID10 First let's get on the same page so we're all talking about apples. What is RAID? RAID originally stood for Redundant Arrays of Inexpensive Disk and was an idea proposed in the early

More information

System Image Backup and Recovery

System Image Backup and Recovery System Image Backup and Recovery Enveloc s new System and Drive Imaging feature is an important part of an effective disaster recovery plan and can allow you to restore a machine after a complete crash

More information

Acronis True Image 2015 REVIEWERS GUIDE

Acronis True Image 2015 REVIEWERS GUIDE Acronis True Image 2015 REVIEWERS GUIDE Table of Contents INTRODUCTION... 3 What is Acronis True Image 2015?... 3 System Requirements... 4 INSTALLATION... 5 Downloading and Installing Acronis True Image

More information

Chapter 8 Operating Systems and Utility Programs

Chapter 8 Operating Systems and Utility Programs Operating Systems What are the functions of an? start the computer provide a user interface manage programs Chapter 8 Operating Systems and Utility Programs administer security control a network manage

More information