Linux: Beyond Backups An overview of restore and recovery technology, and Double-Take Availability
|
|
- Alison Reynolds
- 8 years ago
- Views:
Transcription
1 Linux: Beyond Backups An overview of restore and recovery technology, and Double-Take Availability
2 Contents Introduction... 3 Backing up to Tape or Removable Disk... 5 Open Source DR, DIY and Other Variants DIY Linux Disaster Recovery... 6 Freeware DR... 6 Commercial DR Solutions... 6 Double-Take Availability for Linux... 7 Technical overview of Double-Take Availability for Linux... 7 Origination of Data... 7 Double-Take Availability for Linux File System Filter Driver Selecting the Data... 8 Initialization of a Connection... 9 Replication Mechanics... 9 Data Transmission Conclusion
3 Introduction Linux, once an operating system for computer enthusiasts and contrarians, is now installed on primary production servers in business computing environments around the globe. The deployment of Linux saw a dramatic uptick in 2008, in part because of macroeconomic events that took place in primary trade centers around the world. Today, Linux, in its various forms, is going strong. Even first-tier computer hardware manufacturers like IBM have embraced specific distros of Linux for their System x hardware. Regardless of whether you re running critical business applications on Linux, Windows, UNIX or another mainstream operating system, every organization faces critical intervals when system downtime is unwelcome whether it s planned or unplanned. Increasingly, shops that were able to accommodate modest periods of downtime for backups and system maintenance are finding increased server demands are closing backup windows. Globalization and expanding online business opportunities have been a big contributor to the unwelcomed contraction of periodic backup opportunities. Since nearly all organizations need to keep their systems available for increasing amounts of time, they are now realizing that a system outage of even a few hours will result in disruption, chaos and wasted capital. For many companies, exposure to anything more than an hour or two of downtime has become unpalatable. Current backup processes that include tape or removable disk media fall short of serving the availability and recovery needs of businesses. Shops that thought they weren t candidates for a high availability solution are now feeling an urgent need to start looking at high availability options. 3
4 The purpose of this white paper is to explore current disaster recovery strategies for Linux servers and provide an introduction to the costs and benefits of a Linux-based high availability strategy. Along with this overview of the different Linux protection strategies we will also provide a more in-depth overview of how the Double-Take Availability for Linux product provides a high availability solution for Linux servers. 4
5 Backing Up to Tape or Removable Disk If the axiom you get what you pay for is even somewhat true, then the use of open source software would seem to put a for profit enterprise at a disadvantage since it would seem functionality, reliability and support would be noticeably limited. For nearly 80% of companies in the small to medium range (SMB), their entire disaster recovery strategy consists of performing regular saves to tape or removable disk. This usually includes periodic saves of their entire system, daily incremental tape saves of changed or otherwise critical data, and then storing these tapes safely offsite. Unfortunately, if a failure occurs requiring a bare-metal restore that includes applications and system state settings, it is not unusual for the data recovery time to be up to 48 hours or longer, depending on the time it takes to repair or replace hardware, restore data from tape, and manually recreate all transactions since the last good save. And keep in mind that it is not unusual to run into media errors when restoring from tape. Once the system is running again you can expect a lot of fine tuning to follow and that could take days. There are a growing number of companies who have calculated the real cost of this downtime and as a result have introduced additional layers of protection to reduce data recovery time. Disaster Recovery and High Availability software is well suited for this kind of task. For Linux, there are both open-systems, freeware, do it yourself, and commercial options at your disposal. Open Source Disaster Recovery, DIY and Other Variants For better or worse, the notion of open source software is inextricably linked to the word free. If the axiom you get what you pay for is even somewhat true, then the use of open source software would seem to put a for profit enterprise at a disadvantage since it would seem functionality, reliability and support would be noticeably limited. Furthermore, the absence of operating capital for providers of open source code makes the long range survivability of the organizations that support these software solutions somewhat uncertain. Yet, open source software plays an important role in the grand scheme of things for several reasons. It may save you time if you re developing a system of your own and need a script to plug in It increases your number of options It creates an environment for innovation While open source disaster recovery and high availability solutions exist, disaster recovery is an area where it s best to know exactly what you re getting into. There are instances where open source offerings are embedded within productized solutions and hence, are enhanced, maintained and supported like commercial solutions. If you re getting into a large-scale software development project involving HA and DR functionality then there s a lot to consider. 5
6 DIY Linux Disaster Recovery Linux coders will tell you that part of the beauty of Linux lies in its modularity. Adroit technologists often consider this an invitation to write their own plug-ins or entire applications to accommodate the functionality their organization needs. Given the complexity of good automated disaster recovery systems and the huge collection of scripts that would be needed to mimic some of the functionality in commercial solutions, developing these scripts from scratch almost never shakes out to be a cost-effective approach. And long term maintenance often becomes a problem because people move on in the IT business, and external and internal documentation is often sketchy. Freeware DR While many of the points in the previous text on open source software apply to freeware, there are a few important distinctions with freeware that should be noted. First, with open source software you have access to source code, and with freeware you do not. If you have a penchant to fiddle with source code, then freeware is not the way to go. Freeware is offered on an as is bases. That said, there are several freeware DR solutions available and inevitably, some of them offer the features you need. Yet, you ll find that support, customization and documentation are also offered on an as is basis. Commercial Disaster Recovery Solutions for Linux Environments Because the for-profit model drives commercial software organizations, a productized solution such as Double-Take Availability for Linux is available with full feature sets and around-the-clock support. Double-Take Availability for Linux replicates full system state information, application data, and transactions at the byte-level to a physical, virtual or cloud-based target server in real time. Commercially available HA software is advantageous in the following ways: You have a binding agreement that details what the software is supposed to do. You have a support contract: If you have a problem, your vendor is being paid to fix it. Someone is available to support you during normal business hours or on a 24/7 basis if that s what you have agreed to. You can buy additional functionality or pay for customization. Commercially available software is more polished and typically offers extensive documentation. You can insist on extended backward compatibility. Productized offerings run more efficiently. Open source software systems are often larger than commercially available systems because several programmers collaborate in a less-structured way to achieve the end result. 6
7 Double-Take Availability for Linux Data is generated by the Linux operating system itself, in the form of updates to files through day-to-day changes across various system files. Data is more frequently generated by various applications that run on the server. One such option- Double-Take Availability for Linux is a commercially available disaster recovery and high availability solution. It continuously captures changes as they happen and replicates those changes to one or more servers at any location, over any distance, so you always have access to a current copy of your data, applications and operating system. You can replicate to a disaster recovery site as far away as necessary, over standard IP networks, for maximum protection against data loss and improve performance by compressing the protected data before sending. The likelihood of data loss when compatible databases such as Oracle and MySQL are deployed, is also dramatically reduced. Double-Take Availability for Linux also allows you to implement failover without shared storage or geographic limitations eliminating the single point of failure and providing the freedom to locate servers anywhere. Technical Overview of Double-Take Availability for Linux The following content provides a high-level overview of the basic theory of operations for Double-Take Availability for Linux. This solution employs a replication engine that works with physical or virtual servers running RedHat Enterprise Linux, Novell SuSE Linux Enterprise Server, CentOS Linux or Oracle Enterprise Linux. Origination of Data For the purposes of this discussion, the term data will refer to any digital information that can be visualized by a server as a series of one or more input/output (I/O) operations. Data is generated by the Linux operating system itself, in the form of updates to files through dayto-day changes across various system files. Data is more frequently generated by various applications that run on the server. This data may be non-transaction dependent (such as read and write operations on flat files) or transactional-dependent (such as read and write operations to database systems). In either case, the data will be translated into a stream of I/O operations that will be processed by the Linux file system and committed to disk. Data may be created by end-users, applications, or any other system that can read and write information to the server. Double-Take Availability for Linux File System Filter Driver Double-Take Availability for Linux uses a file system filter driver to integrate itself within the I/O stack on a server. This filter driver allows the Double-Take Availability process to see each I/O operation that flows through the stack to the file system. It should be noted the filter driver is a pseudo-file system mounted on top of the Linux native file systems such as EXT3/4 and ReiserFS. Any read/write operation performed by any application or by the Windows operating system will be visible to the Double-Take Availability driver and therefore, may be subject to replication depending on how Double-Take Availability is configured. 7
8 The Double-Take Availability filter driver is a kernel-mode driver. This means it exists as a kernel module a subset of system memory reserved for high-level operations that cannot be accessed directly by general applications or the end-users. This will permit the Double- Take Availability filter driver to act with minimal impact on the server itself, while still ensuring that each I/O operation is able to be examined. Since filters exist within the server s OS kernel, several safety features have been implemented to ensure they do not adversely impact the system in the event of an error. First, the filter itself only examines data and allows for a copy of required I/O operations to be moved out of the data stream. Double-Take Availability s filter driver is non-blocking, so it will not halt data flow in the event of an error. Instead, should an abnormal condition be created on the server, the Double-Take Availability filter will allow data to pass through unmodified, producing an error event to alert administrators, but not stopping applications and end-users from accessing data. Secondly, even when operating under normal conditions, the Double-Take Availability filter allows other applications (such as anti-virus scanners) to operate without hindrance, so that non-double-take Availability operations may continue as they did before installation of Double-Take Availability. Selecting the Data The replication set is the fundamental unit of data protection for Double-Take Availability on a server. It defines which areas of a file system will be protected, and which will be ignored by the Double-Take Availability during normal operations. These definitions are made using either the management console GUI, or via one of the interfaces supplied by Vision Solutions. Replication sets are defined as a series of rules which indicate to Double-Take Availability a logical unit of files within the server that should be protected. The replication set may contain a group of files, a directory, a group of directories, volume or group of volumes. In addition to the basic definitions, replication sets may also contain inclusion and exclusion information by wildcard (*) definition. Administrators may define extremely specific replication sets to protect only what a specific application would require for resumption of services, or may instead protect a much more general set of data up to and including an entire server. The replication set information is stored in a configuration file called DblTake.db. The Double-Take Availability service will use the replication set rules to determine which replication operations from the driver should be sent to the target. If the Double-Take Availability service sees replication activity from a file that is not within the replication set rules, then the service will notify the driver to not send any more information regarding that particular file. The filter driver will still see change activity for that file, but it will not send any further replication data to the service. Because of this, it s important to note that any changes to the replication set rules, while the connection is established, will require that the connection is disconnected and reconnected to ensure that the filter driver is reset with the updated rules. It should also be noted that no replication data is being passed from the filter driver until a Double-Take Availability connection is established with a target. 8
9 Initialization of a Connection During replication, I/O operations for files that are being protected are processed through the source s file system. As these I/O operations are processed, they must pass through Double- Take Availability s filter driver as they make their way down the I/O stack toward the file system. Once the replication set is defined, it can be connected to a target server via the management console or through one of the Double-Take Availability supplied connection wizards. This will cause a series of events to occur based on the option selected during connection. Generally they are: 1. Double-Take Availability ensures that the target system is responding, that the proper version of Double-Take Availability is installed on the target and that the Double-Take Availability systems on that target are ready to receive information. 2. The connection is established using the repset rules previously defined and the target path that was provided in the connection information. If the target path doesn t exist on the target, it will be created. 3. Once the connection is established, a replication start command will be sent to the filter driver which will cause the driver to start sending up change data. At this time a mirror is also started. The mirror will enumerate the files within the replication set and will read the data from disk and send it to the target. The file structure will be created on the target underneath the target path provided by the connection information. The administrator may choose either a full mirror (over-writing any data on target) or differences only (by file-system blockchecksum) when creating the connection, and the chosen form of mirror operation will initiate on connection. While the mirror is occurring, any changes to the data within a repset will be replicated to the target. 4. After all the mirror data has been received by the target, the mirror process will update the attributes of the target directories to ensure that the attributes and last modify times are correct. The mirror operation will then complete and the connection statistics will report that the mirror is idle. 5. Replication will continue as long as the connection is established. Replication Mechanics Replication of changed data is a continuous process that only ends when the source and target lose communication to the point where queuing is no longer possible, a failover event occurs, or the administrator specifically directs Double-Take Availability to stop protection. Outside of those events, any new data written to any area of the file system within the replication set will be replicated and written to the target. During replication, I/O operations for files that are being protected are processed through the source s file system. As these I/O operations are processed, they must pass through Double-Take Availability s filter driver as they make their way down the I/O stack toward the file system. If the I/O operation is a read (meaning that it will not change the data), then the operation is passed through with no copy made. If the operation is a write, rename, delete or create (or any change to the file system), then as it passes through the filter, a copy of the I/O is extracted by the driver, with the original I/O passing forward through any other filters and eventually to the disk systems. Once the file system accepts the I/O operation, it will 9
10 notify the application that made the change that it successfully completed the operation. This completion is passed back up the I/O stack and at this point that the Double-Take Availability filter driver will package the data into a buffer and send it to the Double-Take Availability service as replication data. The Double-Take Availability service will parse the data being sent from the driver and determine if it is part of the replication set. If the data is not within the replication set rules, meaning that it s not part of the protection set, then the service will notify the driver to not send any further data for that file. If the data is part of the replication set, then the service will generate a Double-Take Availability file operation that would be queued for transmission to the target. This operation is placed in the send queue, which is generally in RAM, but depending on the system load and network latency, could be written to an extended queue location on disk. Data Transmission The Double-Take Availability file operations are temporarily stored within the Send queue on the source system. As always, the order of the operations is maintained within the queue and is consistent with the order in which data was written to disk. The send queue acts as a buffer to the network and in the event that the source cannot send data to the target as fast as it s being written to disk, then the send queue will store Double- Take Availability operations that need to be transmitted. Data will technically always flow through the queuing systems to allow for instantaneous queuing when an emergency bottleneck emerges, but barring such slow-downs or disconnections, file operations remain in the queues for a brief period of time before being transmitted. The Send queue will hand off file operations to the native Linux TCP/IP systems for packetization and transmission across the IP network between source and target. Before transmission, a copy of the operation is placed in the Acknowledgement queue on the source, so if there are errors within the transmission process, the operation can be re-transmitted. The Linux TCP/IP stack or networking system transmits the operations as a series of TCP/ IP datagrams over administrator-specified ports where the target system then receives the information via the target s TCP/IP stack. The Double-Take Availability service running on the target will take data from the network, where sub-systems examine the I/O and perform several integrity checks. Included among these checks are tests to ensure the I/O has been received in its entirety, in the correct I/O transactional order, and without errors. If any test fails, the target will request a re-transmission of any necessary operations from the Acknowledgement queue of the source, and the necessary packages are retransmitted and re-checked for integrity. Since all of these tests and checks are performed on the copy of the I/O taken from the acknowledgement queue, the source is not required to re-read live data. Once the file operation has passed all integrity checks, an acknowledgement packet is sent back to the source, at which point the source will remove the now successfully transmitted file operation from the Acknowledgement queue, freeing up queuing space. On the target, the validated file operations are passed to the Receive queue, where it will either temporarily be held (if there are any disk bottlenecks, etc) or sent to the file system to be written to disk. 10
11 Since each file operation is written in the exact same order as it was written on the source, transactional integrity for any application writing through he file system will be preserved explicitly. This is true across multiple files or within a single file. This is how Double-Take Availability for Linux can safely protect MySQL, Oracle and other forms of transactiondependent data sets. Conclusion When it comes to maintaining the availability of Linux based servers; recovering from minor or major disasters, and ensuring data loss is kept to an absolute minimum, IT professionals have several options at their disposal. Some of these options involve little or no investment, while others are licensed by development houses that develop DR packages for living. There are advantages and disadvantages posed by all of these options that span the gamut of functionality, flexibility and cost of operation. This paper endeavors to help you choose wisely and also offers functional details on a commercial productized option from Vision Solutions called Double-Take Availability for Linux. Through this process of write-order intact byte-level I/O replication, Double-Take Availability for Linux can safely protect nearly any server running a mainstream distribution of Linux. This includes numerous release levels of RedHat Enterprise Linux, Novell SuSE Linux Enterprise Server, CentOS Linux and Oracle Enterprise Linux. About Vision Solutions With over 25,000 customers, Vision Solutions, Inc. is the world s leading provider of information availability software and services for ƒwindows, Linux, IBM Power Systems and Cloud Computing markets. Vision s trusted Double-Take, MIMIX and itera high availability and disaster recovery brands support business continuity, satisfy compliance requirements and increase productivity. Affordable and easy-to-use, Vision products are backed by certified worldwide 24X7 customer support centers and a global partner network that includes IBM (NYSE:IBM), HP (NYSE:HPQ), Microsoft (NASDAQ:MSFT), VMware (NYSE:VMW) and Dell (NASDAQ:DELL). Privately held by Thoma Bravo, Vision Solutions is headquartered in Irvine, California, USA with offices worldwide. For more information, visit, or call (toll-free U.S. and Canada) or Barranca Parkway Irvine, CA Copyright 2011, Vision Solutions, Inc. All rights reserved. IBM and Power Systems are trademarks of International Business Machines Corporation. Windows is a registered trademark of Microsoft Corporation. Linux is a registered trademark of Linus Torvalds.
WHITE PAPER. Header Title. Side Bar Copy. Real-Time Replication Is Better Than Periodic Replication WHITEPAPER. A Technical Overview
Side Bar Copy Header Title Why Header Real-Time Title Replication Is Better Than Periodic Replication A Technical Overview WHITEPAPER Table of Contents Introduction...1 Today s IT Landscape...2 What Replication
More informationMaximizing Data Center Uptime with Business Continuity Planning Next to ensuring the safety of your employees, the most important business continuity
Maximizing Data Center Uptime with Business Continuity Planning Next to ensuring the safety of your employees, the most important business continuity task is resuming business critical operations. Having
More informationWHITE PAPER. Header Title. Side Bar Copy. Header Title. What To Consider When WHITEPAPER. Choosing Virtual Machine Protection.
Side Bar Copy Header Title Header Title What To Consider When Choosing Virtual Machine Protection. WHITEPAPER Table of Contents Introduction... 2 Real-time vs. Periodic Protection... 2 Availability vs.
More informationWHITE PAPER. Header Title. Side Bar Copy. Header Title. Seven Virtualization DR Myths WHITEPAPER
Side Bar Copy Header Title Header Title Seven Virtualization DR Myths WHITEPAPER Seven Virtualization DR Myths As IT departments across the world move more virtualization and virtual technologies into
More informationVirtualized Disaster Recovery from VMware and Vision Solutions Cost-efficient, dependable solutions for virtualized disaster recovery and business
Virtualized Disaster Recovery from VMware and Vision Solutions Cost-efficient, dependable solutions for virtualized disaster recovery and business continuity Cost-efficient, dependable solutions for virtualized
More informationWHITE PAPER ENHANCING YOUR SQL REPORTING SERVICES DEPLOYMENT WITH DOUBLE-TAKE
WHITE PAPER ENHANCING YOUR SQL REPORTING SERVICES DEPLOYMENT WITH DOUBLE-TAKE Published: May 2006 Executive Summary Database Management Systems (DBMS) are the hidden engines behind some of a company's
More informationThe Cost of Free. The Hidden Costs of Server Migrations PERSPECTIVE
The Cost of Free The Hidden Costs of Server Migrations PERSPECTIVE Table of Contents The Hidden Costs of Server Migrations... 2 Why Migrate... 2 Migration Issues... 4 Cost of Free... 5 A More Cost Effective
More informationAn Introduction to System i High Availability. Get to know the core components of HA solutions and important installation considerations.
An Introduction to System i High Availability Get to know the core components of HA solutions and important installation considerations. Introduction Every company faces critical hours when system downtime
More informationVeritas Cluster Server from Symantec
Delivers high availability and disaster recovery for your critical applications Data Sheet: High Availability Overview protects your most important applications from planned and unplanned downtime. Cluster
More informationEffortless No Downtime Server and Storage Migrations
Double-Take Move Effortless No Downtime Server and Storage Migrations Migrating applications, systems and data has always been a challenge for IT staff; in fact, most have just gotten used to the pain
More informationDouble-Take Cloud Migration Center (CMC) Tech Brief
Double-Take Cloud Migration Center (CMC) Tech Brief Overview Double-Take Cloud Migration Center is an online service that enables migrations from VMware vsphere and Amazon Web Services EC2 to Microsoft
More informationThe Benefits of Continuous Data Protection (CDP) for IBM i and AIX Environments
The Benefits of Continuous Data Protection (CDP) for IBM i and AIX Environments New flexible technologies enable quick and easy recovery of data to any point in time. Introduction Downtime and data loss
More informationData Protection with IBM TotalStorage NAS and NSI Double- Take Data Replication Software
Data Protection with IBM TotalStorage NAS and NSI Double- Take Data Replication September 2002 IBM Storage Products Division Raleigh, NC http://www.storage.ibm.com Table of contents Introduction... 3 Key
More informationProtecting Exchange 2010 An Executive Overview of Double-Take Availability
Protecting Exchange 2010 An Executive Overview of Double-Take Availability Introduction Native backup can provide higher levels of data and system protection, but the need for 3rd-party software and hardware
More informationW H I T E P A P E R. Disaster Recovery Virtualization Protecting Production Systems Using VMware Virtual Infrastructure and Double-Take
W H I T E P A P E R Protecting Production Systems Using VMware Virtual Infrastructure and Double-Take Contents Introduction...1 What is VMware Infrastructure?...1 What is Double-Take?...1 Data Protection
More information(Formerly Double-Take Backup)
(Formerly Double-Take Backup) An up-to-the-minute copy of branch office data and applications can keep a bad day from getting worse. Double-Take RecoverNow for Windows (formerly known as Double-Take Backup)
More informationPROTECTING AND ENHANCING SQL SERVER WITH DOUBLE-TAKE AVAILABILITY
PROTECTING AND ENHANCING SQL SERVER WITH DOUBLE-TAKE AVAILABILITY Whitepaper Double-Take Software, Inc. Published: October, 2009 With its ease of use, scalability, reliability and broad industry support,
More informationBusiness Continuity: Choosing the Right Technology Solution
Business Continuity: Choosing the Right Technology Solution Table of Contents Introduction 3 What are the Options? 3 How to Assess Solutions 6 What to Look for in a Solution 8 Final Thoughts 9 About Neverfail
More informationAffordable Remote Data Replication
SANmelody Application Affordable Remote Data Replication Your Data is as Valuable as Anyone s You know very well how critical your data is to your organization and how much your business would be impacted
More informationLeveraging Virtualization for Disaster Recovery in Your Growing Business
Leveraging Virtualization for Disaster Recovery in Your Growing Business Contents What is Disaster Recovery?..................................... 2 Leveraging Virtualization to Significantly Improve Disaster
More informationSymantec Cluster Server powered by Veritas
Delivers high availability and disaster recovery for your critical applications Data Sheet: High Availability Overview protects your most important applications from planned and unplanned downtime. Cluster
More informationVeritas Storage Foundation High Availability for Windows by Symantec
Veritas Storage Foundation High Availability for Windows by Symantec Simple-to-use solution for high availability and disaster recovery of businesscritical Windows applications Data Sheet: High Availability
More informationReal-time Protection for Hyper-V
1-888-674-9495 www.doubletake.com Real-time Protection for Hyper-V Real-Time Protection for Hyper-V Computer virtualization has come a long way in a very short time, triggered primarily by the rapid rate
More informationCA ARCserve Replication and High Availability Deployment Options for Hyper-V
Solution Brief: CA ARCserve R16.5 Complexity ate my budget CA ARCserve Replication and High Availability Deployment Options for Hyper-V Adding value to your Hyper-V environment Overview Server virtualization
More informationDisaster Recovery for Oracle Database
Disaster Recovery for Oracle Database Zero Data Loss Recovery Appliance, Active Data Guard and Oracle GoldenGate ORACLE WHITE PAPER APRIL 2015 Overview Oracle Database provides three different approaches
More informationWindows Server Multi-site Clustering
Windows Server Multi-site Clustering Windows Server Multi-site Clustering Vision Solutions provides market-leading solutions for data protection and recoverability. Applications, like all man-made creations,
More informationHA / DR Jargon Buster High Availability / Disaster Recovery
HA / DR Jargon Buster High Availability / Disaster Recovery Welcome to Maxava s Jargon Buster. Your quick reference guide to Maxava HA and industry technical terms related to High Availability and Disaster
More informationIntegrated and reliable the heart of your iseries system. i5/os the next generation iseries operating system
Integrated and reliable the heart of your iseries system i5/os the next generation iseries operating system Highlights Enables the legendary levels of reliability and simplicity for which iseries systems
More informationDrobo How-To Guide. What You Will Need. Configure Replication for DR Using Double-Take Availability and Drobo iscsi SAN
This document shows you how to use Drobo iscsi SAN storage with Double-Take Availability to deliver replication and DR for servers and applications. Double-Take Availability from Vision Solutions performs
More informationVeritas InfoScale Availability
Veritas InfoScale Availability Delivers high availability and disaster recovery for your critical applications Overview protects your most important applications from planned and unplanned downtime. InfoScale
More informationOne solution to protect all Physical, Virtual and Cloud
One solution to protect all Physical, Virtual and Cloud Andy Ebbs Solution Architect andy.ebbs@visionsolutions.com +44 1905 728 023 +44 7917 326 602 Leaders Have Vision visionsolutions.com 1 What What
More informationVeritas Cluster Server by Symantec
Veritas Cluster Server by Symantec Reduce application downtime Veritas Cluster Server is the industry s leading clustering solution for reducing both planned and unplanned downtime. By monitoring the status
More informationNSI Solutions with Microsoft VSS
Published: March 2004 Abstract With the introduction of Volume Shadow Copy Service (VSS) in Microsoft Windows Server 2003 and Windows Storage Server 2003 and the strength of NSI Software Double-Take you
More informationHigh Availability & Disaster Recovery Development Project. Concepts, Design and Implementation
High Availability & Disaster Recovery Development Project Concepts, Design and Implementation High Availability & Disaster Recovery Development Project CONCEPTS Who: Schmooze Com Inc, maintainers, core
More informationCloud Backup and Recovery
1-888-674-9495 www.doubletake.com Cloud Backup and Recovery Software applications and electronic data are the life blood of a business. When they aren t available due to a disaster or outage, business
More informationBusiness Continuity and Disaster Recovery Workbook: Determining Business Resiliency It s All About Recovery Time
Business Continuity and Disaster Recovery Workbook: Determining Business Resiliency It s All About Recovery Time Introduction This is the third of a series of best practices workbooks designed to familiarize
More informationDouble-Take AVAILABILITY
Double-Take AVAILABILITY Version 8.0.0 Double-Take Availability for Linux User's Guide Notices Double-Take Availability for Linux User's Guide Version 8.0, Monday, April 25, 2016 Check your service agreement
More informationCloud Backup Service Service Description. PRECICOM Cloud Hosted Services
Cloud Backup Service Service Description PRECICOM Cloud Hosted Services Table of Contents Table of Contents 2 1. Cloud Backup Service Service Summary 3 2. Cloud Backup Service Service Definition 4 2.1.
More informationUsing Symantec NetBackup with Symantec Security Information Manager 4.5
Using Symantec NetBackup with Symantec Security Information Manager 4.5 Using Symantec NetBackup with Symantec Security Information Manager Legal Notice Copyright 2007 Symantec Corporation. All rights
More informationSAN Conceptual and Design Basics
TECHNICAL NOTE VMware Infrastructure 3 SAN Conceptual and Design Basics VMware ESX Server can be used in conjunction with a SAN (storage area network), a specialized high speed network that connects computer
More informationSystem Migrations Without Business Downtime. An Executive Overview
System Migrations Without Business Downtime An Executive Overview Businesses grow. Technologies evolve. System migrations may be inevitable, but business downtime isn t. All businesses strive for growth.
More informationCloud Based Application Architectures using Smart Computing
Cloud Based Application Architectures using Smart Computing How to Use this Guide Joyent Smart Technology represents a sophisticated evolution in cloud computing infrastructure. Most cloud computing products
More informationEnhanced Protection and Manageability of Virtual Servers Scalable Options for VMware Server and ESX Server
PARTNER SOLUTION BRIEF Enhanced Protection and Manageability of Virtual Servers Scalable Options for VMware Server and ESX Server Companies relying on the benefits of virtualized environments to reduce
More informationMigration and Building of Data Centers in IBM SoftLayer with the RackWare Management Module
Migration and Building of Data Centers in IBM SoftLayer with the RackWare Management Module June, 2015 WHITE PAPER Contents Advantages of IBM SoftLayer and RackWare Together... 4 Relationship between
More informationHigh Availability for Microsoft SQL Server 7.0 Using Double-Take
High Availability for Microsoft SQL Server 7.0 Using Double-Take High Availability for Microsoft SQL Server 7.0 Using Double-Take Revision 3.0.0 published July 2003 NSI and Double-Take are registered trademarks
More informationREDCENTRIC MANAGED BACKUP SERVICE SERVICE DEFINITION
REDCENTRIC MANAGED BACKUP SERVICE SERVICE DEFINITION SD003 V2.3 Issue Date 02 July 2014 1) SERVICE OVERVIEW The Managed Backup Service (MBS) is a streamlined alternative to traditional backup and restore
More informationDouble-Take Replication in the VMware Environment: Building DR solutions using Double-Take and VMware Infrastructure and VMware Server
Double-Take Replication in the VMware Environment: Building DR solutions using Double-Take and VMware Infrastructure and VMware Server Double-Take Software, Inc. 257 Turnpike Road; Suite 210 Southborough,
More informationWHITE PAPER. The 5 Critical Steps for an Effective Disaster Recovery Plan
WHITE PAPER The 5 Critical Steps for an Effective Disaster Recovery Plan 2 WHITE PAPER The 5 Critical Planning Steps For An Effective Disaster Recovery Plan Introduction In today s climate, most enterprises
More informationData Loss in a Virtual Environment An Emerging Problem
Data Loss in a Virtual Environment An Emerging Problem Solutions to successfully meet the requirements of business continuity. An Altegrity Company 2 3 4 5 Introduction Common Virtual Data Loss Scenarios
More informationDeployment Options for Microsoft Hyper-V Server
CA ARCserve Replication and CA ARCserve High Availability r16 CA ARCserve Replication and CA ARCserve High Availability Deployment Options for Microsoft Hyper-V Server TYPICALLY, IT COST REDUCTION INITIATIVES
More informationAn Esri White Paper January 2010 ArcGIS Server and Virtualization
An Esri White Paper January 2010 ArcGIS Server and Virtualization Esri 380 New York St., Redlands, CA 92373-8100 USA TEL 909-793-2853 FAX 909-793-5953 E-MAIL info@esri.com WEB www.esri.com Copyright 2010
More informationiscsi Top Ten Top Ten reasons to use Emulex OneConnect iscsi adapters
W h i t e p a p e r Top Ten reasons to use Emulex OneConnect iscsi adapters Internet Small Computer System Interface (iscsi) storage has typically been viewed as a good option for small and medium sized
More informationVMware System, Application and Data Availability With CA ARCserve High Availability
Solution Brief: CA ARCserve R16.5 Complexity ate my budget VMware System, Application and Data Availability With CA ARCserve High Availability Adding value to your VMware environment Overview Today, performing
More informationMigration and Building of Data Centers in IBM SoftLayer with the RackWare Management Module
Migration and Building of Data Centers in IBM SoftLayer with the RackWare Management Module June, 2015 WHITE PAPER Contents Advantages of IBM SoftLayer and RackWare Together... 4 Relationship between
More informationSymantec NetBackup 7.1 What s New and Version Comparison Matrix
Symantec 7.1 What s New and Version Comparison Matrix Symantec 7 allows customers to standardize backup and recovery operations across physical and virtual environments with fewer resources and less risk
More informationSymantec NetBackup 7 Clients and Agents
Complete protection for your information-driven enterprise Overview Symantec NetBackup provides a simple yet comprehensive selection of innovative clients and agents to optimize the performance and efficiency
More informationPARALLELS SERVER BARE METAL 5.0 README
PARALLELS SERVER BARE METAL 5.0 README 1999-2011 Parallels Holdings, Ltd. and its affiliates. All rights reserved. This document provides the first-priority information on the Parallels Server Bare Metal
More informationBest practice: Simultaneously upgrade your Exchange and disaster recovery protection
Best practice: Simultaneously upgrade your Exchange and disaster recovery protection March 2006 1601 Trapelo Road Waltham, MA 02451 1.866.WANSync www.xosoft.com Contents The Value Proposition... 1 Description
More informationService Level Agreement (SLA) Arcplace Backup Enterprise Service
(SLA) Arcplace Backup Enterprise Service 1. Introduction This Service Level Agreement ( SLA ) forms an integral part of the Agreement between Arcplace and Customer. This SLA describes the Backup Enterprise
More informationMonitoring DoubleTake Availability
Monitoring DoubleTake Availability eg Enterprise v6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document may
More informationAn Oracle White Paper November 2010. Oracle Real Application Clusters One Node: The Always On Single-Instance Database
An Oracle White Paper November 2010 Oracle Real Application Clusters One Node: The Always On Single-Instance Database Executive Summary... 1 Oracle Real Application Clusters One Node Overview... 1 Always
More informationWeb-Based Data Backup Solutions
"IMAGINE LOSING ALL YOUR IMPORTANT FILES, IS NOT OF WHAT FILES YOU LOSS BUT THE LOSS IN TIME, MONEY AND EFFORT YOU ARE INVESTED IN" The fact Based on statistics gathered from various sources: 1. 6% of
More informationVirtualization Support - Real Backups of Virtual Environments
Virtualization Support Real Backups of Virtual Environments Contents Virtualization Challenges 3 The Benefits of Agentless Backup 4 Backup and Recovery Built for Virtualized Environments 4 Agentless in
More informationWINDOWS AZURE EXECUTION MODELS
WINDOWS AZURE EXECUTION MODELS Windows Azure provides three different execution models for running applications: Virtual Machines, Web Sites, and Cloud Services. Each one provides a different set of services,
More informationData Protection and Recovery
Due to shrinking IT staffing and budgets, many IT organizations are turning to Service Providers for hosting of business-critical systems and applications (i.e., web hosting, email hosting, and database
More informationBackups in the Cloud Ron McCracken IBM Business Environment
Backups in the Cloud Ron McCracken IBM August 8, 2011 Session 9844 Legal Information The following are trademarks of the International Business Machines Corporation in the United States and/or other countries.
More informationMigration and Disaster Recovery Underground in the NEC / Iron Mountain National Data Center with the RackWare Management Module
Migration and Disaster Recovery Underground in the NEC / Iron Mountain National Data Center with the RackWare Management Module WHITE PAPER May 2015 Contents Advantages of NEC / Iron Mountain National
More informationAvailability and Disaster Recovery: Basic Principles
Availability and Disaster Recovery: Basic Principles by Chuck Petch, WVS Senior Technical Writer At first glance availability and recovery may seem like opposites. Availability involves designing computer
More informationProtecting Microsoft SQL Server
Your company relies on its databases. How are you protecting them? Protecting Microsoft SQL Server 2 Hudson Place suite 700 Hoboken, NJ 07030 Powered by 800-674-9495 www.nsisoftware.com Executive Summary
More informationMore Efficient Virtualization Management: Templates
White Paper More Efficient Virtualization Management: Templates Learn more at www.swsoft.com/virtuozzo Published: November 2006 Revised: November 2006 Table of Contents Table of Contents... 2 OS, Middleware
More informationVERITAS Business Solutions. for DB2
VERITAS Business Solutions for DB2 V E R I T A S W H I T E P A P E R Table of Contents............................................................. 1 VERITAS Database Edition for DB2............................................................
More informationIBM Enterprise Linux Server
IBM Systems and Technology Group February 2011 IBM Enterprise Linux Server Impressive simplification with leading scalability, high availability and security Table of Contents Executive Summary...2 Our
More informationHigh Availability for Internet Information Server Using Double-Take 4.x
High Availability for Internet Information Server Using Double-Take 4.x High Availability for Internet Information Server Using Double-Take 4.x published December 2002 NSI and Double-Take are registered
More informationProduct Brief. DC-Protect. Content based backup and recovery solution. By DATACENTERTECHNOLOGIES
Product Brief DC-Protect Content based backup and recovery solution By DATACENTERTECHNOLOGIES 2002 DATACENTERTECHNOLOGIES N.V. All rights reserved. This document contains information proprietary and confidential
More informationDR-to-the- Cloud Best Practices
DR-to-the- Cloud Best Practices HOW TO EFFECTIVELY CONFIGURE YOUR OWN SELF-MANAGED RECOVERY PLANS AND THE REPLICATION OF CRITICAL VMWARE VIRTUAL MACHINES FROM ON-PREMISES TO A CLOUD SERVICE PROVIDER CONTENTS
More informationIP Storage On-The-Road Seminar Series
On-The-Road Seminar Series Disaster Recovery and Data Protection Page 1 Agenda! The Role of IP in Backup!Traditional use of IP networks for backup! backup capabilities! Contemporary data protection solutions
More informationDisaster Recovery Solutions for Oracle Database Standard Edition RAC. A Dbvisit White Paper
Disaster Recovery Solutions for Oracle Database Standard Edition RAC A Dbvisit White Paper Copyright 2011-2012 Dbvisit Software Limited. All Rights Reserved v2, Mar 2012 Contents Executive Summary... 1
More informationMoving beyond tape backup.
IBM Global Services January 2008 Moving beyond tape backup. Addressing the data protection challenges for midsize businesses Page 2 Contents 2 Introduction 2 Data protection challenges 2 Under resourced
More informationBackup and Recovery. What Backup, Recovery, and Disaster Recovery Mean to Your SQL Anywhere Databases
Backup and Recovery What Backup, Recovery, and Disaster Recovery Mean to Your SQL Anywhere Databases CONTENTS Introduction 3 Terminology and concepts 3 Database files that make up a database 3 Client-side
More informationHRG Assessment: Stratus everrun Enterprise
HRG Assessment: Stratus everrun Enterprise Today IT executive decision makers and their technology recommenders are faced with escalating demands for more effective technology based solutions while at
More informationHigh Availability for Microsoft SQL Server 2000 Using Double-Take
High Availability for Microsoft SQL Server 2000 Using Double-Take High Availability for Microsoft SQL Server 2000 Using Double-Take Revision 3.0.0 published July 2003 NSI and Double-Take are registered
More informationUni Vault. An Introduction to Uni Systems Hybrid Cloud Data Protection as a Service. White Paper Solution Brief
Uni Vault An Introduction to Uni Systems Hybrid Cloud Data Protection as a Service White Paper Solution Brief Contents The Challenges of Traditional Backup... 3 The Uni Systems Data Protection as a Service
More informationEnterprise Storage Solution for Hyper-V Private Cloud and VDI Deployments using Sanbolic s Melio Cloud Software Suite April 2011
Enterprise Storage Solution for Hyper-V Private Cloud and VDI Deployments using Sanbolic s Melio Cloud Software Suite April 2011 Executive Summary Large enterprise Hyper-V deployments with a large number
More informationIntegrated System Continuity Solutions for Virtual System Consolidation
Integrated System Continuity Solutions for Virtual System Consolidation Introduction Virtualization and server consolidation address the needs of today s data center environment by taking a large step
More informationFeature Guide DOUBLE-TAKE AVAILABILITY
Feature Guide DOUBLE-TAKE AVAILABILITY Double-Take Availability provides affordable data protection, ensures minimal data loss and enables immediate recovery from any system outage. Double- Take Availability
More informationVMware Backup and Deduplication. Written by: Anton Gostev Product Manager Veeam Software
VMware Backup and Deduplication Written by: Anton Gostev Product Manager Veeam Software Copyright 2005 2009 Veeam Software Inc. All rights reserved worldwide. No part of this publication may be reproduced,
More informationProtecting Microsoft SQL Server with Asigra Cloud Backup
Technical Note Protecting Microsoft SQL Server with Asigra Cloud Backup Table of Contents Introduction 3 Overview - Asigra Cloud Backup Software Platform 3 Microsoft SQL Server Backup Set in Asigra DS-Client
More informationHow to Configure Double-Take on Microsoft Exchange Server
High Availability for Exchange Server 5.0 and 5.5 Using Double-Take 4.x High Availability for Exchange Server 5.0 and 5.5 Using Double-Take 4.x published August 2002 NSI and Double-Take are registered
More informationKey Elements of a Successful Disaster Recovery Strategy: Virtual and Physical by Greg Shields, MS MVP & VMware vexpert
ebook Key Elements of a Successful Disaster Recovery Strategy: Virtual and Physical by Greg Shields, MS MVP & VMware vexpert Greg Shields MS MVP & VMware vexpert Greg Shields is a Senior Partner with Concentrated
More informationEvolution from the Traditional Data Center to Exalogic: An Operational Perspective
An Oracle White Paper July, 2012 Evolution from the Traditional Data Center to Exalogic: 1 Disclaimer The following is intended to outline our general product capabilities. It is intended for information
More informationPlanning and Deploying a Disaster Recovery Solution
Planning and Deploying a Disaster Recovery Solution Produced by SearchStorage.com Presenters: Jon Bock and Ian Selway Sponsored by Copyright 2008 HP. All Rights Reserved. Reproduction, adaptation, or translation
More informationVeritas NetBackup 6.0 Server Now from Symantec
Veritas NetBackup 6.0 Server Now from Symantec Innovative data protection As the recognized leader for enterprise-class backup and recovery, Veritas NetBackup Server software is designed to help provide
More informationHelping MSPs Build Business Continuity & Disaster Recovery Services
CA ARCSERVE R16 Helping MSPs Build Business Continuity & Many IT organizations, especially small businesses, don t have the time, resources or knowledge to build a viable Business Continuity (BC) or Disaster
More informationReducing the Costs and Risks of Branch Office Data Protection
Reducing the Costs and Risks of Branch Office Data Protection Is Your Branch Office Data Really Protected? Regardless of form or fury, disasters can take their toll on any business. In fact, the Department
More informationSecure Your Business with EVault Cloud-Connected Solutions
Secure Your Business with EVault Cloud-Connected Solutions Winfried Posthumus Channel Sales Manager NL Winfried.Posthumus@evault.com 11/22/2012 2012 EVault, Inc. All Rights Reserved 1 Agenda Who is EVault
More informationTECHNOLOGY OVERVIEW INTRONIS CLOUD BACKUP & RECOVERY
INTRONIS CLOUD BACKUP & RECOVERY TECHNOLOGY OVERVIEW CONTENTS Introduction 3 Ease-of-Use 3 Simple Installation 3 Automatic Backup 3 Backup Status Dashboard 4 Off-Site Storage 4 Scalability 4 File Restoration
More informationWindows Server 2008 Hyper-V Backup and Replication on EMC CLARiiON Storage. Applied Technology
Windows Server 2008 Hyper-V Backup and Replication on EMC CLARiiON Storage Applied Technology Abstract This white paper provides an overview of the technologies that are used to perform backup and replication
More informationManaged Services - A Paradigm for Cloud- Based Business Continuity
Managed Services - A Paradigm for Cloud- Based Business Continuity Ron McCracken IBM 6 February 2013 Session Number 12993 Agenda This session is intended to expose key requirements for support of enterprise
More informationOVERVIEW. CEP Cluster Server is Ideal For: First-time users who want to make applications highly available
Phone: (603)883-7979 sales@cepoint.com Cepoint Cluster Server CEP Cluster Server turnkey system. ENTERPRISE HIGH AVAILABILITY, High performance and very reliable Super Computing Solution for heterogeneous
More information