Designing a bullet-proof Disaster Recovery Architecture for business-critical Applications
|
|
|
- Jocelyn Robertson
- 10 years ago
- Views:
Transcription
1 Designing a bullet-proof Disaster Recovery Architecture for business-critical Applications While real disaster incidents are rare, the impacts are dramatic. What if your business-critical Application becomes unavailable? How much data would you lose? How much downtime can you afford? Who would take responsibility? A functioning Disaster Recovery Architecture will make or break the survival of a business in a worst case scenario. This White Paper is aiding companies to design a practical and comprehensive architecture. We will outline essential project goals such as Recovery Point and Recovery Time objectives including ROI considerations and compare the pros and cons of three mainstream strategies. We close the 13 page paper with a modern-day approach to data mirroring which makes your architecture bullet-proof. Libelle AG. Authors: Lars Albrecht, Bernd Baier Libelle AG. All rights reserved.
2 Contents Pages Why is Disaster Recovery still an Issue after all?...3 Scope of a Disaster Recovery Project...3 Disaster Recovery Project Goals...4 Recovery Time and Recovery Point Objectives...4 Transactional Integrity of Application Data...4 Proof-of-Concept Objectives...5 Return on Investment Goals...6 Simplicity Goals...6 Bandwidth Requirements...6 Three popular DR Architectures for Applications...6 Shipping Tapes to an off-site Location...6 Block-Based Storage Replication...7 Standby Databases...8 Using BusinessShadow for Disaster Recovery...9 Setting up a DR System with BusinessShadow...10 Normal Mirroring Operation...11 Switching to the Disaster Recovery Site...11 The BusinessShadow Advantage...12 Vendor Credentials and Live Demo Invite...13 Illustrations Illustration 1: Recovery Point and Time Objectives...4 Illustration 2: Transactional Integrity of Application Data...5 Illustration 3: Pros and Cons of Tape Restore...6 Illustration 4: How distance reduces ROI when using block-based replication...7 Illustration 5: Pros and Cons of Storage Replication....8 Illustration 6: Pros and Cons of Standby Databases...9 Illustration 7: Components of BusinessShadow...10 Illustration 8: Screenshot of BusinessShadow mirroring Landscapes...12 Libelle AG. All rights reserved.
3 Why is Disaster Recovery still an Issue after all? Global dependencies on local application systems, the Sarbanes Oxley Act and threats due to natural disasters, power outages or acts of terrorism are the main market drivers for today s DR Projects. Business needs and legal requirements are clearly demanding a functioning Disaster Recovery concept. However, many companies still don t have adequate mechanisms in place. A non-representative sample of 300 people attending Gartner Inc. s Storage Show affirmed that 44% of attendees expressed that DR was still a project. Only two out of 300 said that they perform change control testing as part of DR1. This says a lot about the current state of Disaster Recovery Projects. Many companies seem to struggle in one way or another with DR. Even companies who do have architectures in place often lack proper testing. In other words: almost everybody is doing some kind of off-site backup or replication, but hardly anybody is having adequate testing procedures in place. In addition to presumably high costs and the time spent for planning and implementing a solution, the project won t seem to deliver short-term benefits for the organization. There are, however, a small but growing number of companies and project managers who show a strong commitment when working towards their DR goals. The priorities in which DR projects are implemented are indicating how companies take responsibility towards their customers, their investors and their employees. A functioning Disaster Recovery Architecture will make or break the survival of the business in a worst-casescenario. Scope of a Disaster Recovery Project We need to keep in mind that DR projects cannot be seen from a pure technical standpoint. It is the company s business which is kept up and running after the disaster incident. Even if done right, providing for example a disk-mirrored SAN infrastructure is only one aspect of the project. Aside from additional technical details (Application system running on a different server, different license keys, DNS failover, application interdependencies ) there are crucial business questions to be answered: Who is in charge for DR? What constitutes a disaster? Who declares a disaster? Who updates the written DR Plan? Who is responsible for DR change management? How often per year are we conducting a DR test? What determines a successful DR test? The contents of these organizational aspects are as important as the technical infrastructure, but are not further detailed in this White Paper. 1 Source: searchcio.techtarget.com/originalcontent/0,289142,sid19_gci ,00.html Libelle AG. All rights reserved. 3 / 13
4 Disaster Recovery Project Goals Recovery Time and Recovery Point Objectives Any DR project starts with the question of the potential data loss in case of a disaster (Recovery Point Objective or RPO ) and the time necessary to have the systems up and running on the DR server (Recovery Time Objective or RTO ). Illustration 1: Recovery Point and Time Objectives RPO = maximum acceptable data loss in case of a disaster RTO = maximum acceptable time until application is up on the DR system The target RPO and RTO values need to be determined by the business and weighed against the Return of Investment of the DR project. With an unlimited budget, companies would like to see RTO and RPO values of zero. Technical and budgetary reasons are however speaking against that. Is it reasonable to invest 5m$ to reduce the RPO from 10 minutes to 1 minute with a disaster probability of 0.5% per given year? The following gives an illustration on calculating a Return on Investment with RPO and RTO in mind: Estimated disaster probability in a given years = 2% Estimated cost for data loss and downtime per incident = $15m Probability cost per incident = $300,000 Average cost of DR solution = $80,000 per year Cost of Avoidance Savings = $220,000 per year Transactional Integrity of Application Data Another goal of Disaster Recovery projects is to have the business data in the correct state upon switch-over. The term transactional integrity refers to the overall integrity of transactions from the point data is entered into an application down to the lowest granularity of a data block on a disk drive. The question of transactional integrity becomes an issue especially when replicating data on a storage-level ( block-level replication ) which is a popular method for local disaster protection for many customers. By definition, the further away we get from the initial transaction within the production system, the lower the transactional integrity. A confirmed storage-block transaction has Libelle AG. All rights reserved. 4 / 13
5 only little to do with a confirmed application or database transaction. Storage blocks make up files, files make up databases, and databases contain data. While differences between every stage should be non-existent, they will show up in the big picture and particularly when mirroring data on a storage level versus mirroring data on a database level as DR architecture. Business-critical application(s) Illustration 2: Transactional Integrity of Application Data Online logs Offline logs Database Data files Database level Files Files Files File level Server / Operating system Storage system / Storage blocks Storage level As users enter data into the application, transactions move through the application system and the database server hands the transactions over to the database. The database makes sure that the transactions are logged properly for backup/recovery purposes and then hands them over to the file system. The file system then makes sure that the respective log files and data files are stored properly and can be accessed through the Operating System. Finally, the operating system hands the files to an internal or external storage controller which makes sure that the files are stored properly and can be accessed through storage blocks, the finest granularity in the whole process. Transactional integrity from the application perspective is critical for Disaster Recovery because it determines in which state we will find our DR system after the production server becomes unavailable. It is critical because it determines if and when we get the application system up and running on the DR system after a disaster incident. Proof-of-Concept Objectives Any backup is only as good as the probability that the restore actually works. The same applies to DR. It would be a nightmare to invest hundreds of thousands of dollars in the project, only to learn that the application won t start on the DR system in case of a disaster incident. It is imperative to insist that regular Disaster Recovery tests, which include the activation of the solution on the DR system, are being held. Well-tested and documented procedure with a good change management control using manual tape restore (low RPO, low RTO) is often of a higher overall value than a blockbased replicated architecture (high RPO, presumably high RTO) which was never tested but should work. Libelle AG. All rights reserved. 5 / 13
6 Return on Investment Goals Any investment needs to bring returns for the business. To calculate the ROI exactly or to at least have an approximate calculation model, Disaster Recovery investments are typically compared to life insurance policies for a business. For calculating how much investment is justified, we determine how much coverage we need and how much we want to spend. The ROI calculation is then based on the cost of downtime for example on a per-day or on a per-hour basis and the actual risk of a disaster incident. Simplicity Goals Even small or medium sized application systems are complex. It takes only one critical component to fail for the whole system to malfunction. Redundancy of components will help a lot to cover outages of single components, but it is the complexity itself which often becomes a threat to the system. Additional components for Disaster Recovery could make systems even more complex and vulnerable. A DR solution should be as simplistic as possible while providing the most comprehensive protection. Bandwidth Requirements The question of how much network bandwidth is reasonable, is another factor influencing the Disaster Recovery project. It is a huge difference cost-wise if we can for example mirror a 400 GB system using an 8 MBit/s WAN link when setting up a standby database versus having to invest in a 100 MBit/s WAN link for a block-based storage replication, especially since these are recurring monthly costs and will exponentially increase with the distance between the production and the DR system. Three popular DR Architectures for Applications Most DR concepts fall into only three different categories: 1. Shipping Backup Tapes to an off-site Disaster Recovery Location 2. Block-based replication by storage hardware or other means 3. Setting up standby databases with native database tools Shipping Tapes to an off-site Location Disaster Recovery with traditional tape backups is the strategy which most companies already perform as part of their backup procedures. A tape backup is performed to create a full copy of the database and files in regular intervals. Those tapes are then shipped to the designated DR location. Pros High transactional integrity Additional protection against user and software errors (Point-in-time Recovery) Least expensive Manual Tape Restore for Disaster Recovery Cons High data loss in case of a disaster Immense time required to restore data at off-site location Manual procedures are time-intensive and bare the risks of human error Illustration 3: Pros and Cons of Tape Restore Libelle AG. All rights reserved. 6 / 13
7 The advantages of this strategy are the minimal investment and no changes in technology since backup to tape is done anyway. The disadvantage is the very low RPO and RTO values: we would lose a lot of data and it typically requires days to be back up and running. Further, a lot of manual interventions are necessary for the restore. Many DR tests showed that no systems restore ever went flawless despite the fact that all involved parties are warned and prepared well ahead of an upcoming test. Block-Based Storage Replication Another popular DR architecture is to implement block-based storage replication. In this method, a second storage system is provided and every bit of data is synchronized to a remote location directly between two storage systems. Hardware and SAN providers typically promote this concept. It is tempting: every single bit of data is copied immediately to the Disaster Recovery site. If something goes wrong, we can simply flip the switch and continue to work with the solution on the DR site. There are of course stipulations attached to it. The multiple dedicated Fiber or ESCON lines necessary to keep the mirror in sync at any given time and proprietary hardware components will add enormous complexity to the systems. This will require a high initial and ongoing investment in bandwidth cost, maintenance and other resources. Network Latency, Costs, Bandwidth Requirements Illustration 4: How distance reduces ROI when using blockbased replication Return on Investment Less than 1 Mile Less than 5 Miles Less than 100 Miles Less than 500 Miles > 1000 Miles The biggest problem however is the distance since it is necessary to replicate every single bit of any transactions at any time. With larger distances, network traffic is largely consisting of overhead due to network latency. The larger the distance, the exponentially severe problems with network latency will get. The latest improvements in storage technology will only make a marginal difference. Finally, replicating every block on a storage system says nothing about data consistency of transactions from an application perspective. Such a replicated mirror can be consistent from a storage perspective (block-level consistency) and at the same time inconsistent from the application perspective (application-level consistency). Typical methods used to restore the application and database consistency are a database crashrecovery and files system checks. Libelle AG. All rights reserved. 7 / 13
8 Pros One size fits all : One approach for complete landscape if everything is centralized on one storage system/san Storage replication software products are on the market for years and typically stable and mature. Potential high Recovery Point Objectives (blocks are mirrored immediately synchronous or asynchronous) Independent from the host server Block-based Replication Cons Low transactional integrity on application/ database level. Typically requires two-identical storage systems or SAN components Additional hardware components add complexity and additional risks High network requirements even with new compression and asynchronous replication technologies Low-span of control and transparency Switch over, including tests manually or by shell script. No protection against user and software errors (point-in-time recovery) Switch-over has to be done manually with scripts High Investments, typically starting at 500k$- 700k$. Illustration 5: Pros and Cons of Storage Replication To cover the disadvantages, we see customers making compromises on their original distance goals so that the Disaster Recovery Server is only 5, 20 or sometimes 30 miles away from the production site in order to choose the block-based replication concept. Standby Databases Using standby databases for Disaster Recovery is the manual or half-automated process of setting up a standby database at a remote location by using scripts and/or tools which are part of the database. The popular databases such as DB2, Oracle, Microsoft SQL Server and MaxDB are providing more or less sophisticated tools enabling customers to build a basic standby database. The architecture is typically set up by assigning the project to an internal DBA or to an external consulting firm. In this scenario, database log files are continuously transferred to the DR site either with scripts or with automated tools. A mirror database would continuously receive database transactions which are then applied into a standby database. Libelle AG. All rights reserved. 8 / 13
9 Pros No additional costs for hardware, requires only a second server Relatively low network requirements High transactional integrity, only committed transactions are mirrored Free database tool No distance limitations Standby Databases Cons Database-centric approach which only covers the database but no flat files. Single-database solution makes it impractical for multi-database environment Typically manual switch-over No enhanced network optimization No support for flat files Potentially slightly lower RPO than hardware replication Complex to set up, manage and operate; requires many manual intervention High resource investment to maintain standby database scripts High dependency on staff to execute the correct steps in case of a disaster Lack of features and automation. Illustration 6: Pros and Cons of Standby Databases The advantage of this method is that there seem to be only little financial investment required since scripts can be written in-house and the tools come typically free with the database. The method further provides a high level of transactional integrity especially compared to a block-based replication. Another advantage is that there are no distance limitation between the production and the disaster recovery location. One of the numerous disadvantages of standby databases is that only the database can be mirrored. Certain flat files which are important for the application system are very often not stored in the database and would not be available after a disaster. Another disadvantage is the lack of automation of standby tools coming with the database. The architecture depends heavily on the knowledge and availability of the database administrator. The staff dependency is not only an issue when setting up the DR mirror initially, but in particular when activating the mirror in case of a disaster incident. Using BusinessShadow for Disaster Recovery BusinessShadow is seen by many as the middle road between block-based replication and standby databases. Compared to block-based replication, BusinessShadow doesn t have any of the typical downsides such as lack of transactional integrity, overcoming large distances, excessive complexity or costs. Compared to standby databases it accommodates multi-database support, flat file mirroring, additional features and full automation of mirroring complete system landscapes. The core DBShadow component of BusinessShadow serves as a physical standby database while covering the missing features and the lack of automation of native standby tools. Other components will take care of the network optimization, the automation of the switch-over process and the handling of the flat files. Hundreds of Libelle AG. All rights reserved. 9 / 13
10 customers worldwide are using BusinessShadow for many years ranging from medium-sized to large enterprises mirroring complete landscapes with multiple terabytes. BusinessShadow consists of four different components: 1. DBShadow to mirror the core databases which can be Oracle, MaxDB, DB2 and MS SQL Server (or a combination of different databases) 2. FSShadow to mirror flat files belonging to the application systems 3. SwitchApplication to switch IP addresses and hostnames to the DR server 4. Option Long Distance to optimize WAN traffic, cover network latency, compress files and ship IP packets parallel to the DR site. Illustration 7: Components of BusinessShadow Setting up a DR System with BusinessShadow The only requirement to set up and operate BusinessShadow is a second server with the same operating system, the same disk space and a standard network connection. From a performance perspective, the mirror server requires enough performance to update changes during normal operation and adequate performance in case of an emergency to run the application. Our customers often use their test or backup systems as a DR server and temporarily shut down tests during the disaster incident. Libelle AG. All rights reserved. 10 / 13
11 Step 1: Initial Load to the DR Site Upon installation, we start with preparing the DR mirror by making a copy of the production system which is done during normal operation without interfering with production. Step 2: Archiver Process continuously ships changes to the DR Site In the next step, all committed transactions on the production system are continuously copied to the mirror server. Customers can specify the maximum archive switch time to define their Recovery Point Objective, for example every 5 or 10 minutes. Interruption due to temporary network, database, application or server outages on either site don t require manual intervention. Enhanced WAN optimization comes with our Option Long Distance and is covering network latency and bandwidth issues. BusinessShadow is the middle road between block-based replication and standby databases. Compared to block-based replication, it doesn t have any of the typical downsides such as lack of transactional integrity, overcoming large distances, excessive complexity or costs. Compared to standby databases it accommodates multi-database support, flat file mirroring, additional features and full automation of mirroring complete system landscapes. Step 3: Recover Process manages the DR Server In the next step we automatically apply the changes from the primary system to the secondary system which holds the copy of the database in loading mode. It is advantageous to wait a couple of hours before applying the changes to protect the mirror system against faulty transactions. If for example a batch job or malicious manipulation destroys the production database, the mirror database would still be valid and can be recovered to any desired time stamp before the point of destruction within minutes. Just as the initial copy, the recover process is fully automated and does not require any manual intervention or special database know-how. The mirror database is kept in a loading mode and changes are continuously applied. All mirroring parameters can be changed dynamically using the GUI or with a Command Line Interface. Normal Mirroring Operation Once the Initial Copy is performed the mirror activated, we are in normal operating mode for Disaster Recovery. Changes are now continuously shipped to the DR server by the Archiver Process. The Recovery Process is either continuously applying those changes. The DR system is ready to take over with current data at any time. Please refer to Illustration 8 for a BusinessShadow GUI screenshot with mirroring a landscape of Oracle, MaxDB and UNIX flat files. Switching to the Disaster Recovery Site The only step necessary in case of a disaster is to instruct BusinessShadow to start up the mirror system, restart the application, eventually switch the IP address and we are up and running on our DR site. The switch-over process is handled smoothly and automated after the process is initialized by the customer: remaining changes are recovered; the database will be renamed to the correct name before it gets restarted. Libelle AG. All rights reserved. 11 / 13
12 The FSShadow component covers flat files and SwitchApplication handles the IP addresses and hostname failover. Illustration 8: Screenshot of BusinessShadow mirroring UNIX flat files and Oracle and MaxDB The BusinessShadow Advantage In comparison to native standby database tools for Disaster Recovery we offer specific value in the following areas: One solution for heterogeneous environments including, DB2, MaxDB, MS SQL Server, Oracle and available on all UNIX and Windows platforms. Solution provides multi-platform support for heterogeneous systems on multiple database technologies such as an ECC system based on Oracle combined with an SAP APO/SAP livecache based on MaxDB. FSShadow/DBShadow combination support mirroring complete landscapes and not only a database. No specific database know-how is required to set up and maintain the mirror and to switch the system in case of a disaster. A dedicated structure process reflects new data files, new directories and nologging transactions on the secondary server. The possibility of dynamic changes of all parameters via GUI keeps everything easy to operate. SwitchApplication provides an automated switch of hostnames and IP addresses Libelle AG. All rights reserved. 12 / 13
13 The Option Long Distance provides massive network optimization including parallel archive shipping, high compression and the Very Large Package Technology to cover network latency for distances > 50 miles. Automated switch-over interfaces for Point-in-Time Recovery, Lossless Switching, Defined-Switching and automated database rename. Radical simplicity of the overall approach with independent server processes will make the DR architecture easy to operate on a day-to-day basis. Vendor Credentials Libelle is an established solution provider for high availability and disaster recovery located in Stuttgart, Germany. A strong team of experts provides years of experience and competences with a proven track record. Customers worldwide trust in the intelligent Libelle software solutions to protect and recover their business-critical data. Libelle customers benefit from excellent one-stop service as support, sales, and software development are all located in Stuttgart. The solutions are supplemented by a great service portfolio, ranging from the design and implementation of holistic HA and DR concepts to 24/7 support. Further, Libelle works in close partnership with all relevant hardware and software vendors and is certified per DIN EN ISO 9001:2008. More Information & Live Demo Invite Please contact us and sign up for a free and non-obligating minute technical demo where we show you a live crash of a production system based on a database of your choice and address your questions. North- and South America All other Countries Libelle LLC Libelle AG 3330 Cumberland Blvd. Suite 500 Gewerbestr. 42 Atlanta, GA , USA Stuttgart, Germany T / T / [email protected] [email protected] Libelle does not guarantee that the information in this presentation is error-free. The liability for consequential or indirect damages arising out of the reading or the use of this information is not warranted by Libelle AG within legal limits. All copyrights, especially distribution, reproduction and translation, are reserved. No part of this presentation may be reproduced (by photocopy, microfilm or otherwise), processed, reproduced or transmitted by electronic means without explicit approval of Libelle. Under no circumstances, including, but not limited to, negligence, shall Libelle, its agents or assignees, including but not limited to its parent, subsidiary, or affiliate companies, be liable for any direct, indirect, incidental, special or consequential damages that result from the use of the information provided on this presentation. Libelle, the Libelle Logo, BusinessShadow, DBShadow and FSShadow are trademarks of Libelle AG, Germany. All other mentioned products and companies in this White Paper are trademarks of their respective owners. Libelle AG. All rights reserved. 13 / 13
High Availability and Disaster Recovery with Libelle BusinessShadow
High Availability and Disaster Recovery with Libelle BusinessShadow Libelle AG has been providing High Availability (HA) and Disaster Recovery (DR) Solutions to the enterprise market for over a decade.
Disaster Recovery and Business Continuity Basics The difference between Disaster Recovery and Business Continuity
Disaster Recovery and Business Continuity Basics Both Business Continuity and Disaster Recovery are very important business issues for every organization. Global businesses cannot simply stop operating,
Disaster Recovery for Oracle Database
Disaster Recovery for Oracle Database Zero Data Loss Recovery Appliance, Active Data Guard and Oracle GoldenGate ORACLE WHITE PAPER APRIL 2015 Overview Oracle Database provides three different approaches
Disaster Recovery Strategy for Microsoft Environment
Disaster Recovery Strategy for Microsoft Environment Introduction In business, a computer disaster equals an event that halts the normal operation of day-to-day business activities. A disastrous event
Constant Replicator: An Introduction
Data Availability Storage Software Constant Replicator: An Introduction Configurations, Applications and Solutions of Constant Replicator A White Paper A Constant Data Technology Document August 2004 Copyright
High Availability and Disaster Recovery for Exchange Servers Through a Mailbox Replication Approach
High Availability and Disaster Recovery for Exchange Servers Through a Mailbox Replication Approach Introduction Email is becoming ubiquitous and has become the standard tool for communication in many
Real-time Protection for Hyper-V
1-888-674-9495 www.doubletake.com Real-time Protection for Hyper-V Real-Time Protection for Hyper-V Computer virtualization has come a long way in a very short time, triggered primarily by the rapid rate
MySQL Enterprise Backup
MySQL Enterprise Backup Fast, Consistent, Online Backups A MySQL White Paper February, 2011 2011, Oracle Corporation and/or its affiliates Table of Contents Introduction... 3! Database Backup Terms...
Business Continuity: Choosing the Right Technology Solution
Business Continuity: Choosing the Right Technology Solution Table of Contents Introduction 3 What are the Options? 3 How to Assess Solutions 6 What to Look for in a Solution 8 Final Thoughts 9 About Neverfail
Veritas Replicator from Symantec
Data replication across multi-vendor storage for cost effective disaster recovery Data Sheet: Disaster Recovery Overviewview provides organizations with a comprehensive solution for heterogeneous data
Connectivity. Alliance Access 7.0. Database Recovery. Information Paper
Connectivity Alliance Access 7.0 Database Recovery Information Paper Table of Contents Preface... 3 1 Overview... 4 2 Resiliency Concepts... 6 2.1 Database Loss Business Impact... 6 2.2 Database Recovery
Connectivity. Alliance Access 7.0. Database Recovery. Information Paper
Connectivity Alliance 7.0 Recovery Information Paper Table of Contents Preface... 3 1 Overview... 4 2 Resiliency Concepts... 6 2.1 Loss Business Impact... 6 2.2 Recovery Tools... 8 3 Manual Recovery Method...
SQL-BackTrack the Smart DBA s Power Tool for Backup and Recovery
SQL-BackTrack the Smart DBA s Power Tool for Backup and Recovery by Diane Beeler, Consulting Product Marketing Manager, BMC Software and Mati Pitkanen, SQL-BackTrack for Oracle Product Manager, BMC Software
Unitrends Integrated Backup and Recovery of Microsoft SQL Server Environments
Solution Brief Unitrends Integrated Backup and Recovery of Microsoft SQL Server Environments Summary Your business infrastructure relies on your Microsoft SQL Servers. Your business no matter the size
The Benefits of Continuous Data Protection (CDP) for IBM i and AIX Environments
The Benefits of Continuous Data Protection (CDP) for IBM i and AIX Environments New flexible technologies enable quick and easy recovery of data to any point in time. Introduction Downtime and data loss
Technical Considerations in a Windows Server Environment
Technical Considerations in a Windows Server Environment INTRODUCTION Cloud computing has changed the economics of disaster recovery and business continuity options. Accordingly, it is time many organizations
PROTECTING MICROSOFT SQL SERVER TM
WHITE PAPER PROTECTING MICROSOFT SQL SERVER TM Your company relies on its databases. How are you protecting them? Published: February 2006 Executive Summary Database Management Systems (DBMS) are the hidden
NetApp SnapMirror. Protect Your Business at a 60% lower TCO. Title. Name
NetApp SnapMirror Protect Your Business at a 60% lower TCO Name Title Disaster Recovery Market Trends Providing disaster recovery remains critical Top 10 business initiative #2 area for storage investment
HA / DR Jargon Buster High Availability / Disaster Recovery
HA / DR Jargon Buster High Availability / Disaster Recovery Welcome to Maxava s Jargon Buster. Your quick reference guide to Maxava HA and industry technical terms related to High Availability and Disaster
Disaster Recovery Solutions for Oracle Database Standard Edition RAC. A Dbvisit White Paper
Disaster Recovery Solutions for Oracle Database Standard Edition RAC A Dbvisit White Paper Copyright 2011-2012 Dbvisit Software Limited. All Rights Reserved v2, Mar 2012 Contents Executive Summary... 1
Synchronous Data Replication
S O L U T I O N S B R I E F Synchronous Data Replication Hitachi Data Systems Synchronous Data Replication Business continuity has become one of the top issues facing businesses and organizations all around
Protecting Microsoft SQL Server
Your company relies on its databases. How are you protecting them? Protecting Microsoft SQL Server 2 Hudson Place suite 700 Hoboken, NJ 07030 Powered by 800-674-9495 www.nsisoftware.com Executive Summary
EMC RECOVERPOINT: BUSINESS CONTINUITY FOR SAP ENVIRONMENTS ACROSS DISTANCE
White Paper EMC RECOVERPOINT: BUSINESS CONTINUITY FOR SAP ENVIRONMENTS ACROSS DISTANCE Applied Technology Abstract Business continuity is a critical component of any enterprise data protection strategy
TABLE OF CONTENTS THE SHAREPOINT MVP GUIDE TO ACHIEVING HIGH AVAILABILITY FOR SHAREPOINT DATA. Introduction. Examining Third-Party Replication Models
1 THE SHAREPOINT MVP GUIDE TO ACHIEVING HIGH AVAILABILITY TABLE OF CONTENTS 3 Introduction 14 Examining Third-Party Replication Models 4 Understanding Sharepoint High Availability Challenges With Sharepoint
A SURVEY OF POPULAR CLUSTERING TECHNOLOGIES
A SURVEY OF POPULAR CLUSTERING TECHNOLOGIES By: Edward Whalen Performance Tuning Corporation INTRODUCTION There are a number of clustering products available on the market today, and clustering has become
Neverfail Solutions for VMware: Continuous Availability for Mission-Critical Applications throughout the Virtual Lifecycle
Neverfail Solutions for VMware: Continuous Availability for Mission-Critical Applications throughout the Virtual Lifecycle Table of Contents Virtualization 3 Benefits of Virtualization 3 Continuous Availability
Simplify Your Migrations and Upgrades. Part 1: Avoiding risk, downtime and long hours
Simplify Your Migrations and Upgrades Part 1: Avoiding risk, downtime and long hours Introduction You can say migrations and upgrades to a database administrator (DBA) or systems administrator. But what
Data Sheet: Backup & Recovery Symantec Backup Exec 12.5 for Windows Servers The gold standard in Windows data protection
The gold standard in Windows data protection Overview Symantec Backup Exec 12.5 delivers market-leading backup and recovery protection from server to desktop, providing complete data protection for the
Neverfail for Windows Applications June 2010
Neverfail for Windows Applications June 2010 Neverfail, from Neverfail Ltd. (www.neverfailgroup.com), ensures continuity of user services provided by Microsoft Windows applications via data replication
Introduction to Enterprise Data Recovery. Rick Weaver Product Manager Recovery & Storage Management BMC Software
Introduction to Enterprise Data Recovery Rick Weaver Product Manager Recovery & Storage Management BMC Software Contents Introduction...1 The Value of Data...2 Risks to Data Assets...2 Physical Loss...2
The Impact Of The WAN On Disaster Recovery Capabilities A commissioned study conducted by Forrester Consulting on behalf of F5 Networks
February 2007 The Impact Of The WAN On Disaster Recovery Capabilities A commissioned study conducted by Forrester Consulting on behalf of F5 Networks TABLE OF CONTENTS Introduction: Upgrading Disaster
Maximizing Data Center Uptime with Business Continuity Planning Next to ensuring the safety of your employees, the most important business continuity
Maximizing Data Center Uptime with Business Continuity Planning Next to ensuring the safety of your employees, the most important business continuity task is resuming business critical operations. Having
Sanovi DRM for Oracle Database
Application Defined Continuity Sanovi DRM for Oracle Database White Paper Copyright@2012, Sanovi Technologies Table of Contents Executive Summary 3 Introduction 3 Audience 3 Oracle Protection Overview
Contingency Planning and Disaster Recovery
Contingency Planning and Disaster Recovery Best Practices Guide Perceptive Content Version: 7.0.x Written by: Product Knowledge Date: October 2014 2014 Perceptive Software. All rights reserved Perceptive
IDERA WHITEPAPER. The paper will cover the following ten areas: Monitoring Management. WRITTEN BY Greg Robidoux
WRITTEN BY Greg Robidoux Top SQL Server Backup Mistakes and How to Avoid Them INTRODUCTION Backing up SQL Server databases is one of the most important tasks DBAs perform in their SQL Server environments
Redefining Oracle Database Management
Redefining Oracle Database Management Actifio PAS Specification A Single Solution for Backup, Recovery, Disaster Recovery, Business Continuity and Rapid Application Development for Oracle. MAY, 2013 Contents
WFT - SAP Disaster Recovery Solution Brief Planning and Automating an SAP Landscape Remote Recovery Procedure
WFT - SAP Disaster Recovery Solution Brief Planning and Automating an SAP Landscape Remote Recovery Procedure Abstract This Solution Brief discusses how WFT Disaster Recovery Services helps a customer
Whitepaper Continuous Availability Suite: Neverfail Solution Architecture
Continuous Availability Suite: Neverfail s Continuous Availability Suite is at the core of every Neverfail solution. It provides a comprehensive software solution for High Availability (HA) and Disaster
High Availability with Postgres Plus Advanced Server. An EnterpriseDB White Paper
High Availability with Postgres Plus Advanced Server An EnterpriseDB White Paper For DBAs, Database Architects & IT Directors December 2013 Table of Contents Introduction 3 Active/Passive Clustering 4
IBM PROTECTIER: FROM BACKUP TO RECOVERY
SOLUTION PROFILE IBM PROTECTIER: FROM BACKUP TO RECOVERY NOVEMBER 2011 When it comes to backup and recovery, backup performance numbers rule the roost. It s understandable really: far more data gets backed
WHITE PAPER. The 5 Critical Steps for an Effective Disaster Recovery Plan
WHITE PAPER The 5 Critical Steps for an Effective Disaster Recovery Plan 2 WHITE PAPER The 5 Critical Planning Steps For An Effective Disaster Recovery Plan Introduction In today s climate, most enterprises
Symantec NetBackup 7 Clients and Agents
Complete protection for your information-driven enterprise Overview Symantec NetBackup provides a simple yet comprehensive selection of innovative clients and agents to optimize the performance and efficiency
Windows Geo-Clustering: SQL Server
Windows Geo-Clustering: SQL Server Edwin Sarmiento, Microsoft SQL Server MVP, Microsoft Certified Master Contents Introduction... 3 The Business Need for Geo-Clustering... 3 Single-location Clustering
Reduce your downtime to the minimum with a multi-data centre concept
Put your business-critical activities in good hands If your income depends on the continuous availability of your servers, you should ask your hosting provider for a high availability solution. You may
Informix Dynamic Server May 2007. Availability Solutions with Informix Dynamic Server 11
Informix Dynamic Server May 2007 Availability Solutions with Informix Dynamic Server 11 1 Availability Solutions with IBM Informix Dynamic Server 11.10 Madison Pruet Ajay Gupta The addition of Multi-node
Contents. SnapComms Data Protection Recommendations
Contents Abstract... 2 SnapComms Solution Environment... 2 Concepts... 3 What to Protect... 3 Database Failure Scenarios... 3 Physical Infrastructure Failures... 3 Logical Data Failures... 3 Service Recovery
IBM TSM DISASTER RECOVERY BEST PRACTICES WITH EMC DATA DOMAIN DEDUPLICATION STORAGE
White Paper IBM TSM DISASTER RECOVERY BEST PRACTICES WITH EMC DATA DOMAIN DEDUPLICATION STORAGE Abstract This white paper focuses on recovery of an IBM Tivoli Storage Manager (TSM) server and explores
Maximum Availability Architecture
Oracle Data Guard: Disaster Recovery for Sun Oracle Database Machine Oracle Maximum Availability Architecture White Paper April 2010 Maximum Availability Architecture Oracle Best Practices For High Availability
WHITE PAPER. Storage Savings Analysis: Storage Savings with Deduplication and Acronis Backup & Recovery 10
Storage Savings Analysis: Storage Savings with Deduplication and Acronis Backup & Recovery 10 Copyright Acronis, Inc., 2000 2009 Table of contents Executive Summary... 3 The Importance of Deduplication...
Quorum DR Report. Top 4 Types of Disasters: 55% Hardware Failure 22% Human Error 18% Software Failure 5% Natural Disasters
SAP High Availability in virtualized environments running on Windows Server 2012 Hyper-V Part 1: Overview Introduction Almost everyone is talking about virtualization and cloud computing these days. This
Unitrends Backup & Recovery Solutions and Disaster Recovery Best Practices
Solution Brief Unitrends Backup & Recovery Solutions and Disaster Recovery Best Practices 2 So you re confident knowing that the backup and recovery solution protecting your business-critical operations
Affordable Remote Data Replication
SANmelody Application Affordable Remote Data Replication Your Data is as Valuable as Anyone s You know very well how critical your data is to your organization and how much your business would be impacted
Oracle Database Backup Service. Secure Backup in the Oracle Cloud
Oracle Database Backup Service Secure Backup in the Oracle Cloud Today s organizations are increasingly adopting cloud-based IT solutions and migrating on-premises workloads to public clouds. The motivation
Four Steps to Disaster Recovery and Business Continuity using iscsi
White Paper Four Steps to Disaster Recovery and Business Continuity using iscsi It s a fact of business life physical, natural, and digital disasters do occur, and they interrupt operations and impact
Data Protection in a Virtualized Environment
The Essentials Series: Virtualization and Disaster Recovery Data Protection in a Virtualized Environment sponsored by by J. Peter Bruzzese Da ta Protection in a Virtualized Environment... 1 An Overview
Oracle Recovery Manager 10g. An Oracle White Paper November 2003
Oracle Recovery Manager 10g An Oracle White Paper November 2003 Oracle Recovery Manager 10g EXECUTIVE OVERVIEW A backup of the database may be the only means you have to protect the Oracle database from
Rajesh Gupta Best Practices for SAP BusinessObjects Backup & Recovery Including High Availability and Disaster Recovery Session #2747
Rajesh Gupta Best Practices for SAP BusinessObjects Backup & Recovery Including High Availability and Disaster Recovery Session #2747 Introduction Rajesh Gupta - [email protected] Solution Network
Restoration Technologies. Mike Fishman / EMC Corp.
Trends PRESENTATION in Data TITLE Protection GOES HERE and Restoration Technologies Mike Fishman / EMC Corp. SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless
Computer-Aided Disaster Recovery Planning Tools (CADRP)
Computer-Aided Disaster Recovery Planning Tools (CADRP) Omar H. Alhazmi Department of Computer Science Taibah University Medina, Saudi Arabia [email protected] Abstract Information Technology Disaster
Oracle Database Disaster Recovery Using Dell Storage Replication Solutions
Oracle Database Disaster Recovery Using Dell Storage Replication Solutions This paper describes how to leverage Dell storage replication technologies to build a comprehensive disaster recovery solution
Total Business Continuity with Cyberoam High Availability
White paper Cyberoam UTM Total Business Continuity with Cyberoam High Availability Companies, big and small, must ensure constant availability of their company's network and data and prepare themselves
Virtual Server System and Data Protection, Recovery and Availability
Virtual Server System and Data Protection, Recovery and Availability Although server virtualization helps reduce IT infrastructure costs, it also adds complexity to protecting the wide range of applications
The Case for Continuous Data Protection
The Case for Continuous Data Protection This paper will discuss the benefits of using CDP-based solutions, particularly in place of traditional, tape-based backup products that currently dominate the SMB
An Oracle White Paper June 2011. Oracle Database Firewall 5.0 Sizing Best Practices
An Oracle White Paper June 2011 Oracle Database Firewall 5.0 Sizing Best Practices Introduction... 1 Component Overview... 1 Database Firewall Deployment Modes... 2 Sizing Hardware Requirements... 2 Database
Cloud, Appliance, or Software? How to Decide Which Backup Solution Is Best for Your Small or Midsize Organization.
WHITE PAPER: CLOUD, APPLIANCE, OR SOFTWARE?........................................ Cloud, Appliance, or Software? How to Decide Which Backup Solution Is Best for Your Small or Midsize Who should read
Microsoft SharePoint 2010 on VMware Availability and Recovery Options. Microsoft SharePoint 2010 on VMware Availability and Recovery Options
This product is protected by U.S. and international copyright and intellectual property laws. This product is covered by one or more patents listed at http://www.vmware.com/download/patents.html. VMware
Continuous Data Protection for any Point-in-Time Recovery: Product Options for Protecting Virtual Machines or Storage Array LUNs
EMC RECOVERPOINT FAMILY Continuous Data Protection for any Point-in-Time Recovery: Product Options for Protecting Virtual Machines or Storage Array LUNs ESSENTIALS EMC RecoverPoint Family Optimizes RPO
Perforce Backup Strategy & Disaster Recovery at National Instruments
Perforce Backup Strategy & Disaster Recovery at National Instruments Steven Lysohir National Instruments Perforce User Conference April 2005-1 - Contents 1. Introduction 2. Development Environment 3. Architecture
Cisco Active Network Abstraction Gateway High Availability Solution
. Cisco Active Network Abstraction Gateway High Availability Solution White Paper This white paper describes the Cisco Active Network Abstraction (ANA) Gateway High Availability solution developed and
Near-Instant Oracle Cloning with Syncsort AdvancedClient Technologies White Paper
Near-Instant Oracle Cloning with Syncsort AdvancedClient Technologies White Paper bex30102507wpor Near-Instant Oracle Cloning with Syncsort AdvancedClient Technologies Introduction Are you a database administrator
High Availability & Disaster Recovery. Sivagopal Modadugula/SAP HANA Product Management Session # 0506 May 09, 2014
High Availability & Disaster Recovery Sivagopal Modadugula/SAP HANA Product Management Session # 0506 May 09, 2014 Legal Disclaimer The information in this document is confidential and proprietary to SAP
11. Configuring the Database Archiving Mode.
11. Configuring the Database Archiving Mode. Abstract: Configuring an Oracle database for backup and recovery can be complex. At a minimum, you must understand the archive process, the initialization parameters
Delivering Fat-Free CDP with Delphix. Using Database Virtualization for Continuous Data Protection without Storage Bloat.
Delivering Fat-Free CDP with Delphix Using Database Virtualization for Continuous Data Protection without Storage Bloat White Paper Delivering Fat- Free CDP with Delphix Revision: June 2012 You can find
Unitt www.unitt.com. Zero Data Loss Service (ZDLS) The ultimate weapon against data loss
Zero Data Loss Service (ZDLS) The ultimate weapon against data loss The ultimate protection for your business-critical data In the past, ultimate data protection was a costly issue, if not an impossible
How can I deploy a comprehensive business continuity and disaster recovery solution in under 24 hours without incurring any capital costs?
SOLUTION BRIEF: CA INSTANT RECOVERY ON DEMAND How can I deploy a comprehensive business continuity and disaster recovery solution in under 24 hours without incurring any capital costs? CA Instant Recovery
Data Sheet: Disaster Recovery Veritas Volume Replicator by Symantec Data replication for disaster recovery
Data replication for disaster recovery Overview Veritas Volume Replicator provides organizations with a world-class foundation for continuous data replication, enabling rapid and reliable recovery of critical
DISASTER RECOVERY BUSINESS CONTINUITY DISASTER AVOIDANCE STRATEGIES
DISASTER RECOVERY BUSINESS CONTINUITY DISASTER AVOIDANCE STRATEGIES Dejan Živanović EMC Technology Solutions Group SEE Presales Manager [email protected] 1 The Business Maturity Model V Enabled Web
DISASTER RECOVERY STRATEGIES FOR ORACLE ON EMC STORAGE CUSTOMERS Oracle Data Guard and EMC RecoverPoint Comparison
DISASTER RECOVERY STRATEGIES FOR ORACLE ON EMC STORAGE CUSTOMERS Oracle Data Guard and EMC RecoverPoint Comparison Document Control Change Record 3 Date Author Version Change Reference 15-Aug-2007 Ravi
BUSINESS CONTINUITY AND DISASTER RECOVERY FOR ORACLE 11g
BUSINESS CONTINUITY AND DISASTER RECOVERY FOR ORACLE 11g ENABLED BY EMC VMAX 10K AND EMC RECOVERPOINT Technical Presentation EMC Solutions Group 1 Agenda Business case Symmetrix VMAX 10K overview RecoverPoint
Leveraging Virtualization for Disaster Recovery in Your Growing Business
Leveraging Virtualization for Disaster Recovery in Your Growing Business Contents What is Disaster Recovery?..................................... 2 Leveraging Virtualization to Significantly Improve Disaster
