Disaster Recovery Exercise - February Services Unit Report
|
|
- Zoe Sharp
- 8 years ago
- Views:
Transcription
1 Disaster Recovery Exercise - February 2012 Services Unit Report Scenario The North part of the ceiling of the Forum server room has collapsed leading to the destruction of all equipment in racks 0,1 and 2. Equipment in other racks is unaffected but due to safety concerns, no access to the server room is permitted. Services affected by this incident must be identified and restored as quickly as possible. Affected equipement The following items of equipment were affected: Name Role Notes squonk AFS file server (1) crocotta AFS file server (1) bunyip AFS file server (1) cameleopard AFS file server (1) ifevo1 AFS Disk Array (2) bioboy Virtual server data mermaid CVS/SVN server stumer Samba server (1)Data from ifevo2 mounted on these hosts remained intact. (2) This array contained only AFS data Initial difficulties The first task was to identify which equipment had actually been affected by this event. Since no up to date documentation recording the contents of the racks in the machine room seems to exist, some other method of determining the contents of the destroyed racks had to be found (had this been a real-life occurrence, it would of course been much easier to determine which hardware was no longer contactable). This was eventually done by consulting the rfe maps for the switchable plug bars attached to the racks in question.
2 Since the possibility exists that these maps might be out of date or incorrect (though we have no reason to think that this is the case for the maps we consulted) it seems desirable to have a more formal and rigourous procedure for recording rack contents. Once ifevo1 had been identified as one of the affected items of equipment, it was necessary to determine which partitions were stored on that array. This procedure was considerably simplified by the presence of a recent printout of the contents of the array on the desk of one member of the unit. This is clearly information which needs to be both accurate and readily available in the event of an incident similar to the one portrayed in this exercise. Some work has been done on determining disk array contents and this work should be built upon to automatically record this information in a safe location at regular intervals. Status of backups All mirrors and backups were completed successfully on the day preceding the incident. This means that the AFS backup volumes were updated between 19:00 and 22:00 on Sunday the 26 th and the mirrors of the CVS, SVN and Samba data were updated between 0:00 and 1:00 on Monday the 27 th. This does expose one weakness in our tape backup strategy. Because we currently back up the mirrors of the CVS, SVN and Samba data and because these backups take place before the mirroring, any data for these services recovered from tape would have been on the order of 24 hours out of date. There is no real reason why this data cannot be backed up directly from the relevant servers and this should be done as a matter of urgency. Actions taken AFS data There are two possible courses of action available when AFS data becomes unavailable due to an event of this sort. One is to somehow obtain replacement hardware for the servers and storage lost and restore the lost AFS volumes to this hardware. The other is to promote the offsite RO copies of the affected volumes to be RW volumes. Both procedures have their advantages and disadvantages. Restoring data from tape has the disadvantage that it takes a considerable amount of time to restore the data. The inconvenience to the user can be somewhat ameliorated during this period by allowing them read-only access to the data contained in the RO volumes. The big advantage of restoring RW data from tape is that once the data is restored, no further action is required.
3 How long will the restore of data take? Special tools exist within TiBS to speed up the recovery of entire partitions or servers but at the moment we have little real idea of how long the process might take. We should carry out a test restore of an entire partition in the near future and extrapolate from that approximate times for restoring entire servers and sites. Promoting the RO volumes to RW has the major advantage that the users have full access to their data in a very short timeframe. We estimate that in this case, all access to AFS data would have been restored well within 2 hours of the start of the process. The main disadvantage of this approach is the time taken to restore the service to its original state. Although the RW volumes will be once more available, they will be on the 'wrong' site (our policy is to have all RW volumes located in the central area) and there will be no offsite RO volumes leaving us very vulnerable to further failures. A very rough estimate based on the time taken to move all the RW volumes to the central area in the first place is that it would take several weeks to restore the service to its original state. Consideration needs to be given to how we might most efficiently carry out this process. The specifics of this incident means that there is a third alternative to consider. Because some of the data mounted on the destroyed servers survived since the arrays they were on were mounted on a separate rack, it would be possible to promote the RO copies of the volumes on the destroyed array to RWs and mount the RW volumes still in existence on a different server, probably one of the servers in Appleton Tower. Data restored in this way would take longer to make available than a simple promotion of a RO volume but would still be available more quickly than if they had been restored from tape. We estimate that data restored in this way would be available by the end of the first day of the incident. This is not a procedure of which we have practical experience within the School and we should try this out in the near future. Non-AFS data Two services were affected by this incident, CVS/SVN and the admin Samba service. In both cases, only the server hardware was located in the destroyed racks, the service data was located on an array in a surviving rack. As mentioned in the backups section, even if this had not been the case, it would have been possible to retrieve the data from the off-site mirrors and failing that from the backup tapes though as explained above, the data recovered using this method would have been over 24 hours old. One issue raised by this exercise is the availability of server hardware
4 suitable for restoring services to. In most cases, the simplest solution is simply to set up a VM for the service and accept, in the short term at least, any performance issues which may result from this. In the case of services using fibre mounted storage however, this is not an option as we cannot currently use fibre attached storage with VMs. In this case, a supply of physical server hardware and fibre HBAs is needed. It is obviously desirable that this cache of hardware should not be located in a server room or indeed in a basement area, given that flood is probably one of the more likely scenarios which we have to plan for. Since the CVS/SVN service had been the subject of a major restoration effort last year, we decided that restoring the Samba service would offer more possibility of lessons being learned. Our experiences are recounted in the section below: Restoration of the Samba service When considering the restore of the Samba service, there were at least three possibilities: installing new hardware, re-using existing hardware, or using a VM. Since we had no new & unused hardware kicking around, it was either existing hardware or a VM. The initial choice was to create a VM to host the restored Samba service - but it was discovered that the current VM installation options do not allow for SL5 to be installed (and our Samba service requires SL5, as there was no SL6 component, etc), so it was then decided to re-use an existing machine, fantoosh.inf, and restore the service to this. The requisite resources from stumer's profile were copied across to fantoosh, and configured on that host - generating the relevant files. If this happened for real, the partitions containing the data would be restored, and so paths would remain the same (and not have to be tweaked as in the exercise). Currently, the samba data is mirrored to disk, and then that mirror partition is dumped to tape. As a test of this, the data was recovered from tape of the mirror (rather than from the extant mirror, as would be the case in an actual incident - assuming the mirror survived, of course). The time this takes varies with the current TiBS load, and can take several hours (for example, restoring 37Mb from a 453Gb mirror partition backup took 7 hours). This would have been quicker if the data was backed up directly to tape, rather than via the mirror partition. Once the profile configuration was complete, and the password and user files copied into place from the adminsmb restore, it was possible to run the samba component and start the daemon - which made the shares available to other hosts.
5 Lessons learned and actions arising Lessons 1. Some system should be put in place to record and regularly update the contents of server room racks. 2. The configuration of the various disk arrays needs to be dumped to a secure location at regular intervals. 3. Service data should be backed up, wherever possible, directly from the host providing the service. 4. There needs to be a supply of server and fibre hardware available for cases where a VM cannot act as a suitable replacement. Actions 1. Instigate a rack content recording system 2. Arrange for regular dumping of disk configuration information (services unit) 3. Arrange for service data to be backed up directly (services unit) 4. Carry out test restore of entire AFS partition (services unit) 5. Experiment with mounting AFS volumes on a different server (services unit) 6. Arrange for supply of replacement server and fibre hardware 7. Give consideration as to the best way to restore the AFS service to normality after promoting offsite RO volumes (services unit) 8. Need to think about what it means if ext3/4 journals being held on SSDs internal to the server when the disks are on a SAN elsewhere, and the machine and SSD (and so journals) get destroyed, but the file systems on the SAN survive. What would that mean when trying to bring the file system back online on another machine (without the journal)?
A Backup Strategy for Informatics Craig Strachan Version 1.0 31/01/2011
A Backup Strategy for Informatics Craig Strachan Version 1.0 31/01/2011 This document identifies the various types of backup being carried out in the School of Informatics, briefly considers the characteristics
More informationPerforce Backup Strategy & Disaster Recovery at National Instruments
Perforce Backup Strategy & Disaster Recovery at National Instruments Steven Lysohir National Instruments Perforce User Conference April 2005-1 - Contents 1. Introduction 2. Development Environment 3. Architecture
More informationThe New Rules for Choosing Physical Appliances
content provided by sponsored by The New Rules for Choosing Physical Appliances The increased presence of virtualization in organizations hasn t lessened the need for physical backup appliances. Follow
More informationAvailability and Disaster Recovery: Basic Principles
Availability and Disaster Recovery: Basic Principles by Chuck Petch, WVS Senior Technical Writer At first glance availability and recovery may seem like opposites. Availability involves designing computer
More informationInformation Services hosted services and costs
Information Services hosted services and costs 1. Overview Information Services (I.S.) has provided a popular hosting service for specialized departmental servers for many years. Servers hosted by I.S.
More informationBackup and Recovery 1
Backup and Recovery What is a Backup? Backup is an additional copy of data that can be used for restore and recovery purposes. The Backup copy is used when the primary copy is lost or corrupted. This Backup
More informationHow To Limit Volume In Bacula
Disk Backup Design Using Bacula This document is intended to provide insight into the considerations and processes required to design and implement a Disk Backup strategy for a large site with Bacula.
More informationBackup and Recovery. What Backup, Recovery, and Disaster Recovery Mean to Your SQL Anywhere Databases
Backup and Recovery What Backup, Recovery, and Disaster Recovery Mean to Your SQL Anywhere Databases CONTENTS Introduction 3 Terminology and concepts 3 Database files that make up a database 3 Client-side
More informationLeveraging Virtualization for Disaster Recovery in Your Growing Business
Leveraging Virtualization for Disaster Recovery in Your Growing Business Contents What is Disaster Recovery?..................................... 2 Leveraging Virtualization to Significantly Improve Disaster
More informationDisk-to-Disk-to-Tape Backup for a Citrix XenServer Cluster Bacula conference 2012. Robert Müller 25.09.2012
Disk-to-Disk-to-Tape Backup for a Citrix XenServer Cluster Bacula conference 2012 Robert Müller Agenda (1) Introduction (2) Use Case (3) Solution Design (4) Realisation (5) Findings (6) Questions & Answers
More informationDisaster Recovery Remote off-site Storage for single server environment
. White Paper Disaster Recovery Remote off-site Storage for single server environment When it comes to protecting your data there is no second chance January 1, 200 Prepared by: Bill Schmidley CompassPoint
More informationAFS Usage and Backups using TiBS at Fermilab. Presented by Kevin Hill
AFS Usage and Backups using TiBS at Fermilab Presented by Kevin Hill Agenda History of AFS at Fermilab Current AFS usage at Fermilab About Teradactyl How TiBS and TeraMerge works AFS History at FERMI Original
More informationLocal Government Cyber Security:
Local Government Cyber Security: Guidelines for Backing Up Information A Non-Technical Guide Essential for Elected Officials Administrative Officials Business Managers Multi-State Information Sharing and
More informationDepartment of Technology Services UNIX SERVICE OFFERING
Department of Technology Services UNIX SERVICE OFFERING BACKGROUND The Department of Technology Services (DTS) operates dozens of UNIX-based systems to meet the business needs of its customers. The services
More informationConsiderations when Choosing a Backup System for AFS
Considerations when Choosing a Backup System for AFS By Kristen J. Webb President and CTO Teradactyl LLC. October 21, 2005 The Andrew File System has a proven track record as a scalable and secure network
More informationICT Disaster Recovery Plan
7 Appendix A ICT Disaster Recovery Plan Definition of a Disaster A computer disaster is the occurrence of any computer system or associated event which causes the interruption of business, leading in the
More informationData Protection in a Virtualized Environment
The Essentials Series: Virtualization and Disaster Recovery Data Protection in a Virtualized Environment sponsored by by J. Peter Bruzzese Da ta Protection in a Virtualized Environment... 1 An Overview
More informationAFS Usage and Backups using TiBS at Fermilab. Presented by Kevin Hill
AFS Usage and Backups using TiBS at Fermilab Presented by Kevin Hill Agenda History and current usage of AFS at Fermilab About Teradactyl How TiBS (True Incremental Backup System) and TeraMerge works AFS
More informationVirtual Infrastructure Security
Virtual Infrastructure Security 2 The virtual server is a perfect alternative to using multiple physical servers: several virtual servers are hosted on one physical server and each of them functions both
More informationCyber Security: Guidelines for Backing Up Information. A Non-Technical Guide
Cyber Security: Guidelines for Backing Up Information A Non-Technical Guide Essential for Executives, Business Managers Administrative & Operations Managers This appendix is a supplement to the Cyber Security:
More informationWhat s New with VMware Virtual Infrastructure
What s New with VMware Virtual Infrastructure Virtualization: Industry-Standard Way of Computing Early Adoption Mainstreaming Standardization Test & Development Server Consolidation Infrastructure Management
More informationSAN Conceptual and Design Basics
TECHNICAL NOTE VMware Infrastructure 3 SAN Conceptual and Design Basics VMware ESX Server can be used in conjunction with a SAN (storage area network), a specialized high speed network that connects computer
More informationBackupAssist Common Usage Scenarios
WHITEPAPER BackupAssist Version 5 www.backupassist.com Cortex I.T. Labs 2001-2008 2 Table of Contents Introduction... 3 Disaster recovery for 2008, SBS2008 & EBS 2008... 4 Scenario 1: Daily backups with
More informationVirtual Disaster Recovery
Virtual Disaster Recovery White Paper September 16, 2008 Kelly Laughton Davenport Group Consultant Davenport Group 2008. All rights reserved. Introduction Today s data center has evolved into a complex,
More informationDisaster Recovery Checklist Disaster Recovery Plan for <System One>
Disaster Recovery Plan for SYSTEM OVERVIEW PRODUCTION SERVER HOT SITE SERVER APPLICATIONS (Use bold for Hot Site) ASSOCIATED SERVERS KEY CONTACTS Hardware Vendor System Owners Database Owner
More informationOregon-Montana Disaster Recovery Phase 1
Oregon-Montana Disaster Recovery Phase 1 Oregon Department of Administrative Services Enterprise Technology Services http://www.oregon.gov/das/ets/pages/index.aspx Category 10: Cyber Security Project Completion
More informationThe Shift Cloud Computing Brings to Disaster Recovery
The Shift Cloud Computing Brings to Disaster Recovery Mike Klein President, Online Tech June 21, 2010 Disasters Happen WHY DISASTER RECOVERY? How Do You Recover All of Your Electronic Assets? Recover Your
More informationOffsite Disaster Recovery Plan
1 Offsite Disaster Recovery Plan Offsite Disaster Recovery Plan Presented By: Natan Verkhovsky President Disty Portal Inc. 2 Offsite Disaster Recovery Plan Introduction This document is a comprehensive
More informationA backup is a copy of your files that will be able to reproduce the original, if it is lost, damaged or stolen.
Backup Strategy Backup strategy A backup is a copy of your files that will be able to reproduce the original, if it is lost, damaged or stolen. Two or even three backups can be made. Backups should be
More informationExpert Reference Series of White Papers. Visions of My Datacenter Virtualized
Expert Reference Series of White Papers Visions of My Datacenter Virtualized 1-800-COURSES www.globalknowledge.com Visions of My Datacenter Virtualized John A. Davis, VMware Certified Instructor (VCI),
More informationVersion: 1.5 2014 Page 1 of 5
Version: 1.5 2014 Page 1 of 5 1.0 Overview A backup policy is similar to an insurance policy it provides the last line of defense against data loss and is sometimes the only way to recover from a hardware
More informationConsiderations when Choosing a Backup System for AFS
Considerations when Choosing a Backup System for AFS By Kristen J. Webb President and CTO Teradactyl LLC. June 18, 2005 The Andrew File System has a proven track record as a scalable and secure network
More informationMATATIELE LOCAL MUNICIPALITY DISASTER RECOVERY PLAN
MATATIELE LOCAL MUNICIPALITY DISASTER RECOVERY PLAN INDEX Page PART 1: OBJECTIVE 3 PART 2: RESPONSIBILITES 3 PART 3: DOCUMENTATION 3 PART 4: DATA BACKUP 3 PART 5: DISASTER RECOVERY PROCEDURE 3 5.1 Power
More informationVERITAS Backup Exec 9.1 for Windows Servers. Intelligent Disaster Recovery Option
WHITE PAPER Intelligent Disaster Recovery VERITAS Backup Exec 9.1 for Windows Servers Intelligent Disaster Recovery Option 11/20/2003 1 TABLE OF CONTENTS Introduction...3 Solution: Point-in-Time Disaster
More informationFlying Circus RCA report #13266 2014-03-18
Christian Theune Root Cause Analysis FOCAL POINT Loss of VM data and prolonged downtime while restoring from backup. WHEN from Monday, 2014-03-10 14:30 until Tuesday, 2014-03-11 13:17 while moving old
More informationOne Solution for Real-Time Data protection, Disaster Recovery & Migration
One Solution for Real-Time Data protection, Disaster Recovery & Migration Built-in standby virtualisation server Backs up every 15 minutes up to 12 servers On and Off-site Backup User initialed file, folder
More informationBACKUP POLICY Date: 04/12/2009
BACKUP POLICY Date: 04/12/2009 Approvals Head of Department Signature Date Municipal Manager Signature. Date Divisional Manager: Information Management Signature.. Date.. Table contents Heading Page Overview
More informationVeeam Backup and Replication Architecture and Deployment. Nelson Simao Systems Engineer
Veeam Backup and Replication Architecture and Deployment Nelson Simao Systems Engineer Agenda Veeam Backup Server / Proxy Architecture Veeam Backup Server / Backup Proxy Backup Transport Modes Physical
More informationPRODUCT SCENARIOS BEST-IN-CLASS DISASTER RECOVERY FOR WINDOWS SERVERS
PRODUCT SCENARIOS BEST-IN-CLASS DISASTER RECOVERY FOR WINDOWS SERVERS StorageCraft ShadowProtect Server and ShadowProtect Small Business Server provide fast and reliable disaster recovery, data protection
More informationHyper-V Protection. User guide
Hyper-V Protection User guide Contents 1. Hyper-V overview... 2 Documentation... 2 Licensing... 2 Hyper-V requirements... 2 Windows Server 2012 Hyper-V support... 3 2. Hyper-V protection features... 3
More informationBackup & Disaster Recovery Options
Backup & Disaster Recovery Options Since businesses have become more dependent on their internal computing capability, they are increasingly concerned about recovering from equipment failure, human error,
More informationDisaster Recovery Planning
Assess, Adjust, Improve An LXI Publication Page 1 of 11 Your company's ability to recover is a high priority. In a survey by Contingency Planning & Management Magazine of 1437 contingency planners, 76%
More informationDistribution One Server Requirements
Distribution One Server Requirements Introduction Welcome to the Hardware Configuration Guide. The goal of this guide is to provide a practical approach to sizing your Distribution One application and
More informationComputer Backup Strategies
Computer Backup Strategies Think how much time it would take to recreate everything on your computer...if you could. Given all the threats to your data (viruses, natural disasters, computer crashes, and
More informationPractical issues in DIY RAID Recovery
www.freeraidrecovery.com Practical issues in DIY RAID Recovery Based on years of technical support experience 2012 www.freeraidrecovery.com This guide is provided to supplement our ReclaiMe Free RAID Recovery
More informationIT Disaster Recovery Plan Template
HOPONE INTERNET CORP IT Disaster Recovery Plan Template Compliments of: Tim Sexton 1/1/2015 An information technology (IT) disaster recovery (DR) plan provides a structured approach for responding to unplanned
More information<Client Name> IT Disaster Recovery Plan Template. By Paul Kirvan, CISA, CISSP, FBCI, CBCP
IT Disaster Recovery Plan Template By Paul Kirvan, CISA, CISSP, FBCI, CBCP Revision History REVISION DATE NAME DESCRIPTION Original 1.0 2 Table of Contents Information Technology Statement
More informationEducation and Workforce Development Cabinet POLICY/PROCEDURE. Policy Number: EDU-06 Effective Date: April 15, 2006 Revision Date: December 20, 2012
Education and Workforce Development Cabinet POLICY/PROCEDURE Policy Number: EDU-06 Effective Date: April 15, 2006 Revision Date: December 20, 2012 Subject: Backup Procedures Tower and Server Farms Policy:
More informationHow To Back Up A Computer To A Backup On A Hard Drive On A Microsoft Macbook (Or Ipad) With A Backup From A Flash Drive To A Flash Memory (Or A Flash) On A Flash (Or Macbook) On
Solutions with Open-E Data Storage Software (DSS V6) Software Version: DSS ver. 6.00 up40 Presentation updated: September 2010 Different s opportunities using Open-E DSS The storage market is still growing
More informationSCHEDULE A DEMO BACKUP AND RECOVERY. deliver true Business Continuity in one, powerful, integrated system.
deliver true Business Continuity in one, powerful, integrated system. Protect Your Business: instantly restore entire systems, email boxes, databases in minutes Backups Verified: each backup is verified
More informationNCTE Advice Sheet Storage and Backup Advice Sheet 7
Storage and Backup No matter how well you treat your system, no matter how much care you take, you cannot guarantee that your data will be safe if it exists in only one place. The risks are much greater
More informationHIPAA Security Matrix
HIPAA Matrix Hardware : 164.308(a)(1) Management Process =Required, =Addressable Risk Analysis The Covered Entity (CE) can store its Risk Analysis document encrypted and offsite using EVault managed software
More informationPOLICY NAME IT DISASTER RECOVERY POLICY AND PLAN POLICY NUMBER POLICY FILE REFERENCE 3/3/6 DATE OF ADOPTION REVIEW OR AMENDMENT DATES
POLICY NAME IT DISASTER RECOVERY POLICY AND PLAN POLICY NUMBER P6 POLICY FILE REFERENCE 3/3/6 DATE OF ADOPTION REVIEW OR AMENDMENT DATES C O N T E N T S INTRODUCTION SECTION 1 DISASTER PREVENTION AND RECOVERY
More informationINSIDE. Preventing Data Loss. > Disaster Recovery Types and Categories. > Disaster Recovery Site Types. > Disaster Recovery Procedure Lists
Preventing Data Loss INSIDE > Disaster Recovery Types and Categories > Disaster Recovery Site Types > Disaster Recovery Procedure Lists > Business Continuity Plan 1 Preventing Data Loss White Paper Overview
More informationVDC SLA Annex Additional Terms for Virtual Data Centre - SLAs
CONTENTS 1 Introduction... 2 2 Infrastructure Service Level Objectives... 2 2.1 Availability Calculation:... 2 3 Compute Platform... 2 3.1 Availability Service Level... 2 3.1.1 Availability Objectives...
More informationManaging, Maintaining Data in a Virtual World
Moving, ed.harnish@acronis.com Ed Acronis Harnish, Inc. VP Managing, Maintaining Data in a Virtual World BR The VM, Console DR and & Archiving and Recovery Operating Recovery Strategies System Agenda High
More informationBlock-Level Incremental Backup
A STORAGE MANAGEMENT SOLUTION from VERITAS Software Corporation Advanced techniques for consistent database s with minimal operational impact. Contents BACKUP: BECAUSE STUFF HAPPENS... 5 ADVANCED BACKUP
More information1 Introduction 2. 2 Document Disclaimer 2
Important: We take great care to ensure that all parties understand and appreciate the respective responsibilities relating to an infrastructure-as-a-service or self-managed environment. This document
More informationOnline Backup Solution with Disaster Recovery
Online Backup Solution with Disaster Recovery Backup Replacement - Online For Businesses looking for Consistent, Reliable and Offsite Backup, with Minimal Data loss, Generational Management and Disaster
More informationStorageCraft Technology Corporation Leading the Way to Safer Computing 2004-2006 StorageCraft Technology Corporation. All Rights Reserved.
COMPETITIVE ADVANTAGES ShadowProtect Desktop Edition Overview ShadowProtect Desktop Edition supports Windows 2000 Professional, XP Home and XP Professional. This version provides automatic online backup
More informationAffordable Remote Data Replication
SANmelody Application Affordable Remote Data Replication Your Data is as Valuable as Anyone s You know very well how critical your data is to your organization and how much your business would be impacted
More informationVirtual server management: Top tips on managing storage in virtual server environments
Tutorial Virtual server management: Top tips on managing storage in virtual server environments Sponsored By: Top five tips for managing storage in a virtual server environment By Eric Siebert, Contributor
More informationDR-Site and Minimal downtime
Dawlance Relies On Vmware vsphere & Veeam Backup & Replication for Speedy DR-Site and Minimal downtime Simplifying Disaster Recovery What makes a true disaster Recovery solution? The ability to restore
More informationWhich Backup Option is Best?
Which Backup Option is Best? Which Backup Option is Best? Why Protect Your Data? Data loss disasters happen more frequently than you would think, for many different reasons: Human error and accidental
More informationDisaster Recovery: Protect Your Business & Prepare Your Digital Prepress Operations
Eastman Kodak Company 343 State Street Rochester, NY 14650-0238 USA Revision date: March 2014 White Paper Contact Name Robyn Lundstrom PSSG Specialist, KODAK Unified Workflow Solutions robyn.lundstrom@kodak.com
More informationBrightStor ARCserve Backup for Windows
BrightStor ARCserve Backup for Windows Agent for Microsoft SQL Server r11.5 D01173-2E This documentation and related computer software program (hereinafter referred to as the "Documentation") is for the
More information1. Introduction... 2. 2. About the BackupAssist Hyper-V solution... 2. Advantages... 2. Features... 2. Granular technology... 2
Contents 1. Introduction... 2 2. About the BackupAssist Hyper-V solution... 2 Advantages... 2 Features... 2 Granular technology... 2 The BackupAssist VM Granular Restore Console... 2 Limitations and requirements...
More informationSolution Overview. Business Continuity with ReadyNAS
Business Continuity with ReadyNAS What is ReadyNAS? ReadyNAS is a family of network storage solutions for small and medium businesses, workgroups, and remote/home offices. ReadyNAS delivers unified storage
More informationAvailability Digest. www.availabilitydigest.com. Backup Is More Than Backing Up May 2009
the Availability Digest Backup Is More Than Backing Up May 2009 So you think that your corporate data is safe? Your company s data is its lifeblood. Lose it without the chance of recovery, and your company
More informationSecurity+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 13 Business Continuity
Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 13 Business Continuity Objectives Define environmental controls Describe the components of redundancy planning List disaster recovery
More informationTk20 Backup Procedure
Tk20 Backup Procedure 1 TK20 BACKUP PROCEDURE OVERVIEW 3 FEATURES AND ADVANTAGES: 3 TK20 BACKUP PROCEDURE 4 DAILY BACKUP CREATION 4 TRANSFER OF BACKUPS 5 AUDITING PROCESS 5 BACKUP REPOSITORY 5 WRITE TO
More informationContinuous Data Protection. PowerVault DL Backup to Disk Appliance
Continuous Data Protection PowerVault DL Backup to Disk Appliance Continuous Data Protection Current Situation The PowerVault DL Backup to Disk Appliance Powered by Symantec Backup Exec offers the industry
More informationMigrating VSMs & Performing disaster recovery
Migrating VSMs & Performing disaster recovery In CloudByte ElastiStor 2015 CloudByte Inc. 1 Contents Migrating VSMs and performing disaster recovery in CloudByte ElastiStor... 3 Introduction... 3 VSM migration...
More informationOregon-Montana Disaster Recovery Phase 1 & 2
Oregon-Montana Disaster Recovery Phase 1 & 2 Oregon Department of Administrative Services Enterprise Technology Services http://www.oregon.gov/das/ets/pages/index.aspx Category: Disaster Recovery/Security
More informationHow To Support A Client On A Contract With Bps Resolver
Service Level Agreement for Vendor-Hosted Solution Introduction This Vendor-Hosted Service Level Agreement ( SLA ) describes certain performance and security components regarding the services provided
More informationBackupAssist v6 quickstart guide
Using the new features in BackupAssist v6... 2 VSS application backup (Exchange, SQL, SharePoint)... 2 Backing up VSS applications... 2 Restoring VSS applications... 3 System State backup and restore...
More informationTiburon Master Support Agreement Exhibit 6 Back Up Schedule & Procedures. General Notes on Backups
General Notes on Backups This document describes the procedures to backup the minimum set of files required to recover application and/or data files in the event of a hardware failure or data loss. These
More informationBuilding a Disaster Recovery Program By: Stieven Weidner, Senior Manager
Building a Disaster Recovery Program By: Stieven Weidner, Senior Manager Part two of a two-part series. If you read my first article in this series, Building a Business Continuity Program, you know that
More informationUSER GUIDE. PageScope Enterprise Suite. Backup and Recovery
PageScope Enterprise Suite Backup and Recovery USER GUIDE Date : 07/31/2008 Written by: Tony Gliatta, Vartkes Tashjian and Rob Posenato Location: CEC Lab, HQ Ramsey, NJ Table of Content Chapter 1 PageScope
More informationWishful Thinking vs. Reality in Regards to Virtual Backup and Restore Environments
NOVASTOR WHITE PAPER Wishful Thinking vs. Reality in Regards to Virtual Backup and Restore Environments Best practices for backing up virtual environments Published by NovaStor Table of Contents Why choose
More informationGetting Your Practice Ahead
Volume 4: Data Backup Essentials For Physicians Edited By : Vinod Venugopal Disclaimer: The following document was created for free distribution by Technical Doctor Inc. The document contains reference
More informationSystem Protection for Hyper-V Whitepaper
Whitepaper Contents 1. Introduction... 2 Documentation... 2 Licensing... 2 Hyper-V requirements... 2 Definitions... 3 Considerations... 3 2. About the BackupAssist Hyper-V solution... 4 Advantages... 4
More informationSnapshot Technology: Improving Data Availability and Redundancy
Snapshot Technology: Improving Data Availability and Redundancy. All rights reserved. Table of Contents Introduction...3 Snapshot Overview...3 Functional Description...6 Creating Snapshots...7 Other Snapshot
More informationAttix5 Pro Disaster Recovery
Attix5 Pro Disaster Recovery Recommended steps An overview of the recommended steps for a disaster recovery. Copyright notice and proprietary information This document is published by Attix5 or its local
More informationServer and Storage Virtualization with IP Storage. David Dale, NetApp
Server and Storage Virtualization with IP Storage David Dale, NetApp SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individuals may use this
More informationRAID Implementation for StorSimple Storage Management Appliance
RAID Implementation for StorSimple Storage Management Appliance Alpa Kohli June, 2012 KB-00008 Document Revision 1 StorSimple knowledge base articles are intended to provide customers with the information
More informationTECHNICAL PAPER. Veeam Backup & Replication with Nimble Storage
TECHNICAL PAPER Veeam Backup & Replication with Nimble Storage Document Revision Date Revision Description (author) 11/26/2014 1. 0 Draft release (Bill Roth) 12/23/2014 1.1 Draft update (Bill Roth) 2/20/2015
More informationRAID Utility User s Guide Instructions for setting up RAID volumes on a computer with a MacPro RAID Card or Xserve RAID Card.
RAID Utility User s Guide Instructions for setting up RAID volumes on a computer with a MacPro RAID Card or Xserve RAID Card. 1 Contents 3 RAID Utility User s Guide 3 Installing the RAID Software 4 Running
More informationMosaic IT Directors Series. Snapshots, Replication and iscsi: A Practical Guide
Mosaic IT Directors Series Snapshots, Replication and iscsi: A Practical Guide Introduction/Overview 3 The New Reality -- Operations Must Be Online 4 What Constitutes a Disaster? 4 Data Protection - One
More informationREGIONAL CENTER DISASTER RECOVERY PLAN
APPENDIX L REGIONAL CENTER DISASTER RECOVERY PLAN I. ADMINISTRATIVE INFORMATION: A. Introduction to Operational Recovery Plan B. Procedures to update and Distribute ORP C. Process to test ORP D. Plans
More informationCHAPTER 9 System Backup and Restoration, Disk Cloning
CHAPTER 9 System Backup and Restoration, Disk Cloning Learning Objectives After completing this lesson, you should be able to: i. Explain the method of doing data backup and restoration. ii. Describe the
More informationSOUTH LAKELAND DISTRICT COUNCIL INTERNAL AUDIT FINAL REPORT IT 11-02. IT Backup, Recovery and Disaster Recovery Planning
SOUTH LAKELAND DISTRICT COUNCIL INTERNAL AUDIT FINAL REPORT IT 11-02 IT Backup, Recovery and Disaster Recovery Planning Executive Summary Introduction As part of the 2011/12 Audit Plan and following discussions
More informationAljex Software, Inc. Business Continuity & Disaster Recovery Plan. Last Updated: June 16, 2009
Business Continuity & Disaster Recovery Plan Last Updated: June 16, 2009 Business Continuity & Disaster Recovery Plan Page 2 of 6 Table of Contents Introduction... 3 Business Continuity... 3 Employee Structure...
More informationOmniCube. SimpliVity OmniCube and Multi Federation ROBO Reference Architecture. White Paper. Authors: Bob Gropman
OmniCube SimpliVity OmniCube and Multi Federation ROBO Reference Architecture White Paper Authors: Bob Gropman Date: April 13, 2015 SimpliVity and OmniCube are trademarks of SimpliVity Corporation. All
More informationDNS must be up and running. Both the Collax server and the clients to be backed up must be able to resolve the FQDN of the Collax server correctly.
This howto describes the setup of backup, bare metal recovery, and restore functionality. Collax Backup Howto Requirements Collax Business Server Collax Platform Server Collax Security Gateway Collax V-Cube
More informationBest Practices for Disk Based Backup
Best Practices for Disk Based Backup Using Bacula This document is intended to provide insight into the considerations and processes required to implement a backup strategy using disks with Bacula. Bacula
More informationAcronis Backup & Recovery for Mac. Acronis Backup & Recovery & Acronis ExtremeZ-IP REFERENCE ARCHITECTURE
Acronis Backup & Recovery for Mac Acronis Backup & Recovery & Acronis ExtremeZ-IP This document describes the technical requirements and best practices for implementation of a disaster recovery solution
More informationHP Business Continuity and Availability with VMware. Create a resilient IT foundation for better business outcomes.
HP Business Continuity and Availability with VMware Create a resilient IT foundation for better business outcomes. Can you keep your business up and running? Whether it s managing an unscheduled power
More informationHow to Backup and Restore a VM using Veeam
How to Backup and Restore a VM using Veeam Table of Contents Introduction... 3 Assumptions... 3 Add ESXi Server... 4 Backup a VM... 6 Restore Full VM... 12 Appendix A: Install Veeam Backup & Replication
More information