Redpaper. A Disaster Recovery. Solution Selection Methodology. Front cover. ibm.com/redbooks. Learn and apply a Disaster Recovery
|
|
|
- Kerry Byrd
- 10 years ago
- Views:
Transcription
1 Front cover A Disaster Recovery Solution Selection Methodology Learn and apply a Disaster Recovery Solution Selection Methodology How to find the right Disaster Recovery solution Working with IBM TotalStorage products Cathy Warrick John Sing ibm.com/redbooks Redpaper
2
3 International Technical Support Organization A Disaster Recovery Solution Selection Methodology February 2004
4 Note: Before using this information and the product it supports, read the information in Notices on page v. First Edition (February 2004) This edition applies to the gamut of IBM TotalStorage products. Copyright International Business Machines Corporation All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp.
5 Contents Notices v Trademarks vi Preface vii The team that wrote this Redpaper vii Become a published author vii Comments welcome viii Chapter 1. Disaster Recovery Solution Selection Methodology The challenge in selecting Disaster Recovery solutions The nature of Disaster Recovery solutions The tiers of Disaster Recovery Blending tiers into an optimized solution Using tiers as a communication tool to senior management and others The use of tiers in this Redpaper Disaster Recovery Solution Selection Methodology tutorial Flowchart of the methodology Intended usage and limitations of the methodology Hourglass concept in Disaster Recovery Solution Methodology Steps in the Disaster Recovery Solution Selection Methodology Value of the Disaster Recovery Solution Selection Methodology Step D: Turn over identified solutions to detailed evaluation team Updating the methodology as technology advances An example: Using the DR Solution Selection Methodology Step A: Ask specific questions in a specific order Step B: Use level of outage and Tier/RTO to identify RTO solution subset Step C: Eliminate non-solutions Step D: Turn over identified preliminary solutions to evaluation team Summary Chapter 2. Sample scenarios Scenario 1: An efficient 24-hour recovery Step A: Client requirements Step B: Level of outage and Tier/RTO to identify RTO solution subset Step C: Eliminate non-solutions Scenario 2: A long distance recovery at Tier Step A: Client requirements Step B: Level of outage and Tier/RTO to identify RTO solution subset Step C: Eliminate non-solutions Scenario 3: Enterprise long distance recovery at Tier Step A: Client requirements Step B: Level of outage and Tier/RTO to identify RTO solution subset Step C: Eliminate non-solutions Appendix A. Disaster Recovery Solution Selection Methodology matrixes Starter set of business requirement questions Disaster Recovery Solution Matrix Notes on the Solution Matrix cells Eliminate non-solutions matrixes Copyright IBM Corp All rights reserved. iii
6 Tier 7 Planned Outage Tier 7 Unplanned Outage Tier 7 Transaction Integrity Tier 6 Planned Outage Tier 6 Unplanned Outage Tier 6 Transaction Integrity Tier 5 Planned Outage Tier 5 Unplanned Outage Tier 5 Transaction Integrity Tiers 4 and 3 Planned Outage Tier 4 Unplanned Outage Tier 4 Transaction Integrity Tier 3 Unplanned Outage Tier 3 Transaction Integrity Tiers 2 and 1 Planned Outage Tiers 2 and 1 Unplanned Outage Tiers 2 and 1 Transaction Integrity Additional business requirements questions Justifying business continuance to the business Business requirements questions for detailed evaluation team Related publications IBM Redbooks How to get IBM Redbooks Help from IBM Index iv A Disaster Recovery Solution Selection Methodology
7 Notices This information was developed for products and services offered in the U.S.A. IBM may not offer the products, services, or features discussed in this document in other countries. Consult your local IBM representative for information on the products and services currently available in your area. reference to an IBM product, program, or service is not intended to state or imply that only that IBM product, program, or service may be used. functionally equivalent product, program, or service that does not infringe any IBM intellectual property right may be used instead. However, it is the user's responsibility to evaluate and verify the operation of any non-ibm product, program, or service. IBM may have patents or pending patent applications covering subject matter described in this document. The furnishing of this document does not give you any license to these patents. You can send license inquiries, in writing, to: IBM Director of Licensing, IBM Corporation, North Castle Drive Armonk, NY U.S.A. The following paragraph does not apply to the United Kingdom or any other country where such provisions are inconsistent with local law: INTERNATIONAL BUSINESS MACHINES CORPORATION PROVIDES THIS PUBLICATION "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF NON-INFRINGEMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Some states do not allow disclaimer of express or implied warranties in certain transactions, therefore, this statement may not apply to you. This information could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein; these changes will be incorporated in new editions of the publication. IBM may make improvements and/or changes in the product(s) and/or the program(s) described in this publication at any time without notice. references in this information to non-ibm Web sites are provided for convenience only and do not in any manner serve as an endorsement of those Web sites. The materials at those Web sites are not part of the materials for this IBM product and use of those Web sites is at your own risk. IBM may use or distribute any of the information you supply in any way it believes appropriate without incurring any obligation to you. Information concerning non-ibm products was obtained from the suppliers of those products, their published announcements or other publicly available sources. IBM has not tested those products and cannot confirm the accuracy of performance, compatibility or any other claims related to non-ibm products. Questions on the capabilities of non-ibm products should be addressed to the suppliers of those products. This information contains examples of data and reports used in daily business operations. To illustrate them as completely as possible, the examples include the names of individuals, companies, brands, and products. All of these names are fictitious and any similarity to the names and addresses used by an actual business enterprise is entirely coincidental. COPYRIGHT LICENSE: This information contains sample application programs in source language, which illustrates programming techniques on various operating platforms. You may copy, modify, and distribute these sample programs in any form without payment to IBM, for the purposes of developing, using, marketing or distributing application programs conforming to the application programming interface for the operating platform for which the sample programs are written. These examples have not been thoroughly tested under all conditions. IBM, therefore, cannot guarantee or imply reliability, serviceability, or function of these programs. You may copy, modify, and distribute these sample programs in any form without payment to IBM for the purposes of developing, using, marketing, or distributing application programs conforming to IBM's application programming interfaces. Copyright IBM Corp All rights reserved. v
8 Trademarks The following terms are trademarks of the International Business Machines Corporation in the United States, other countries, or both: FlashCopy Redbooks(logo) AIX AS/400 DB2 Enterprise Storage Server ESCON ^ FICON GDPS HyperSwap ibm.com IBM OS/390 OS/400 pseries Redbooks RS/6000 S/390 Tivoli TotalStorage z/os zseries The following terms are trademarks of other companies: Microsoft, Windows, Windows NT, and the Windows logo are trademarks of Microsoft Corporation in the United States, other countries, or both. UNIX is a registered trademark of The Open Group in the United States and other countries. Other company, product, and service names may be trademarks or service marks of others. vi A Disaster Recovery Solution Selection Methodology
9 Preface This Redpaper will help you design a Disaster Recovery solution and presents a Disaster Recovery Solution Selection Methodology to assist in this process. The team that wrote this Redpaper This Redpaper was produced by a team of specialists from around the world working at the International Technical Support Organization, San Jose Center. Cathy Warrick is a Project Leader at the International Technical Support Organization, San Jose Center. Before joining the ITSO, she worked in the IBM Storage Field Education group, managing the Technical Leadership Program John Sing is a Senior Consultant with IBM Systems Group Business Continuance Strategy and Planning, helping to plan and integrate IBM TotalStorage products into the overall IBM Business Continuance strategy and product portfolio. He started in the Disaster Recovery arena in 1994 while on assignment to IBM Hong Kong S.A.R. of China and IBM China. In 1998, John joined the Enterprise Storage Server (ESS) Planning team for PPRC, XRC, and FlashCopy ; in 2000, John became the Marketing Manager for ESS Copy Services, and in mid-2002, joined the Systems Group. John has been with IBM for 22 years. Thanks to the following people for their contributions to this project: Rainer Eisele, SVA GmbH, an IBM Business Partner Ray Pratts, Mark III System, an IBM Business Partner Ulrich Walter, IBM Ian R. Wright, IBM Become a published author Join us for a two- to six-week residency program! Help write an IBM Redbook dealing with specific products or solutions, while getting hands-on experience with leading-edge technologies. You'll team with IBM technical professionals, Business Partners and/or clients. Your efforts will help increase product acceptance and client satisfaction. As a bonus, you'll develop a network of contacts in IBM development labs, and increase your productivity and marketability. Find out more about the residency program, browse the residency index, and apply online at: ibm.com/redbooks/residencies.html Copyright IBM Corp All rights reserved. vii
10 Comments welcome Your comments are important to us! We want our papers to be as helpful as possible. Send us your comments about this Redpaper or other Redbooks in one of the following ways: Use the online Contact us review redbook form found at: ibm.com/redbooks Send your comments in an Internet note to: Mail your comments to: IBM Corporation, International Technical Support Organization Dept. QXXE Building 80-E2 650 Harry Road San Jose, California viii A Disaster Recovery Solution Selection Methodology
11 1 Chapter 1. Disaster Recovery Solution Selection Methodology There are a wide variety of IBM TotalStorage Disaster Recovery technologies and solutions. Each are very powerful in their own way, and each has their own unique characteristics. How can we select the optimum combination of solutions? How do we organize and manage all these valid Disaster Recovery technologies? These questions have vexed Disaster Recovery solution designers for a long time. Developing the skill to perform this selection function effectively was often time consuming and incomplete. It can be difficult to transfer these skills to other colleagues. In this Redpaper, we offer a suggested Disaster Recovery Solution Selection Methodology that is designed to provide assistance to this problem. The intent of our methodology is to allow us to navigate the seemingly endless permutations of Disaster Recovery technology quickly and efficiently, and to identify initial preliminary, valid, cost-justified solutions. This methodology is not designed to replace in-depth skills. It is meant as a guideline and a framework. Proper application of this methodology can significantly reduce the effort and time required to identify proper solutions, and therefore accelerate the selection cycle. For more information about this methodology, see the redbook IBM TotalStorage Solutions for Disaster Recovery, SG Copyright IBM Corp All rights reserved. 1
12 1.1 The challenge in selecting Disaster Recovery solutions From an IT infrastructure standpoint, there are a large variety of valid Disaster Recovery products. The fundamental challenge is to select the optimum blend of all these Disaster Recovery products and technologies. The common problem in the past has been a tendency to view the Disaster Recovery solution as individual product technologies and piece parts; see Figure 1-1. Instead, Disaster Recovery solutions need to be viewed as a whole, integrated multiproduct solution. In this chapter we propose a Disaster Recovery Solution Selection Methodology that can be used to sort, summarize, and organize the various business requirements in a methodical way. Then, we methodically use those business requirements to efficiently identify a proper and valid subset of Disaster Recovery technologies to address the requirements. Each vendor and product area tends to build separate pieces of the solution Insufficient interlocking of the different areas Business Continuance and Disaster Recovery need to be seen as an integrated product solution Many valid technologies, but how to choose among them? Figure 1-1 Historical challenges in selecting Disaster Recovery solutions The nature of Disaster Recovery solutions To combine and properly select among multiple products, disciplines, and skills to effect a successful IT Disaster Recovery solution, we first observe that we can categorize all valid Disaster Recovery IT technologies into five component domains: Servers Storage Software and automation Networking and physical infrastructure Skills and services required to implement and operate the above All IT infrastructure necessary to support the Disaster Recovery solution can be inserted into one of these five components; see Figure 1-2 on page 3. 2 A Disaster Recovery Solution Selection Methodology
13 The Solution: True Nature of Disaster Recovery xseries pseries iseries Solaris HP-UX WinNT/2000 zseries xseries pseries iseries Solaris HP-UX WinNT/2000 Operating System Applications Operations Staff zseries Data Network Staff Applications Staff Management Control A comprehensive approach with the five IT component areas results in a solution: Telecom Network Physical Facilities 1. Servers 2. Storage 3. Software and Automation 4. Networking (includes Physical Infrastructure) 5. Skills and Services Provide all five to assure: "On Time, On Budget, On Demand" Figure 1-2 The five components These five categories provide a framework to organize the various component evaluation skills that will be needed. Gathering the proper mix of evaluation skills together facilitates an effective comparison, contrast, and blending of all five product component areas to arrive at an optimum solution. 1.2 The tiers of Disaster Recovery The concept of tiers is a common method used in today s best practices for Disaster Recovery solution design. The concept of tiers is powerful and central to our selection methodology, because the tiers concept recognizes that for a given client Recovery Time Objective (RTO), all Disaster Recovery products and technologies can be sorted into a RTO solution subset that addresses that particular RTO range. By categorizing Disaster Recovery technology into the various tiers, we have the capability to more easily match our desired RTO time with the optimum set of technologies. The reason for multiple tiers is that as the RTO time decreases, the optimum Disaster Recovery technologies for RTO must change. For any given RTO, there are always a particular set of optimum price/performance Disaster Recovery technologies. The tiers concept is flexible. As products and functions change and improve over time, the Tiers chart only needs to be updated by the addition of that new technology into the appropriate tier and RTO. The Tiers chart, shown in Figure 1-3 on page 4, gives a generalized view of some of today s IBM Disaster Recovery technologies by tier. As the recovery time becomes shorter, then Chapter 1. Disaster Recovery Solution Selection Methodology 3
14 more aggressive Disaster Recovery technologies must be applied to achieve that RTO (carrying with them their associated increase in value and capital cost). Tiers of Disaster Recovery Best Disaster Recovery practice is blend tiers of solutions in order to maximize application coverage at lowest possible cost. One size, one technology, or one methodology doesn't fit all applications. Value Tier 7 - Highly automated, business wide, integrated solution (Example: GDPS/PPRC/VTS P2P, AIX HACMP/PPRC, OS/400 HABP... minutes to hours data recreation up to 24 hours data recreation hours data recreation 15 Min. 1-4 Hr Hr Hr Hr.. 24 Hr.. Days Figure 1-3 Tiers of Disaster Recovery Tier 6 - Storage mirroring (example: XRC, PPRC, VTS Peer to Peer) Tier 5 - Software two site, two phase commit (transaction integrity) Tier 4 - Batch/Online database shadowing & journaling, Point in Time disk copy (FlashCopy), TSM-DRM Tier 3 - Electronic Vaulting, TSM**, Tape Tier 2 - PTAM, Hot Site, TSM** Tier 1 - PTAM* Recovery Time Tiers based on SHARE definitions Zero or near zero data recreation Applications with low tolerance to outage Applications somewhat tolerant to outage Applications very tolerant to outage *PTAM = Pickup Truck Access Method with Tape **TSM = Tivoli Storage Manager *** = Geographically Dispersed Parallel Sysplex The concept and shape of the Tiers chart continues to apply even as the scale of the application or applications changes. Large scale applications will tend to move the curve to the right, and small scale applications will tend to move the curve to the left. But in both cases, the general relationship of the various tiers and Disaster Recovery technologies to each other remains the same. Finally, although some Disaster Recovery technologies fit into multiple tiers, clearly there is not one Disaster Recovery technology that can be optimized for all the tiers. Of course, your technical staff can and should, when appropriate, create a specific version of the Tiers chart for your particular environment. After the staff agrees on what tier or tiers and corresponding RTO a solution delivers for your enterprise, then Disaster Recovery technical evaluation and comparisons are much easier, and the technology alternatives can be tracked and organized in relation to each other. Although the technology within the tiers has obviously changed through time, the concept continues to be as valid today as when it was first described by the U.S. SHARE user group in Blending tiers into an optimized solution Best practices today in designing a Disaster Recovery solution is to further use the tiers concept to derive a blended Disaster Recovery solution for the entire enterprise. The most common result, from an enterprise standpoint, is a strategic architecture of three tiers in a blended Disaster Recovery solution. Three tiers generally appear as an optimum number, 4 A Disaster Recovery Solution Selection Methodology
15 because at the enterprise level, two tiers generally are insufficiently optimized (in other words, overkill at some point and underkill at others), and four tiers are more complex, but generally do not provide enough additional strategic benefit. To use the tiers to derive a blended, optimized enterprise Disaster Recovery architecture, we suggest the following steps: 1. Categorize the business' entire set of applications into three bands: Low tolerance to outage, Somewhat tolerant to outage, and Very tolerant to outage. Of course, although some applications that are not in and of themselves critical, they do feed the critical applications. Therefore, those applications would need to be included in the higher tier. 2. Within each band, there are tiers. The individual tiers represent the major Disaster Recovery technology choices for that band. It is not necessary to use all the tiers, and of course, it is not necessary to use all the technologies. 3. After we have segmented the applications (as best we can) into the three bands, we usually select one best strategic Disaster Recovery methodology for that band. The contents of the tiers are the candidate technologies from which the strategic methodology is chosen. A blended architecture optimizes and maps the varying application recovery time requirements with an appropriate technology at an optimized cost. The net resulting blended tier Disaster Recovery architecture provides the best possible application coverage for the minimum cost Using tiers as a communication tool to senior management and others The concept of tiers is also very useful as a communication tool regarding Disaster Recovery solution recommendations to others in the department, and especially to senior management. The tier concept is simple enough that non-technical personnel can see the end result of technical evaluations in a straightforward fashion. Senior management does not need to understand the technology that is inside the tier; but they can clearly see the Recovery Time Objective and the associated cost versus RTO trade-off. This ability to communicate the bottom line allows senior management to understand the recommendation, the trade-offs, and therefore make a decision quickly and efficiently. Because of the clarity of the decision alternatives, it can be more likely that management understands the choices and reaches decisions more quickly. This clarity of the choices and the associated financial cost should result in a higher likelihood of adequate funding for the Disaster Recovery project The use of tiers in this Redpaper We categorized the product information in this Redpaper by tiers. You will easily be able to recognize what tier or tiers any given technology is likely to be in, and in this way, be able to categorize where a particular Disaster Recovery tool and solution can be used in your environment. In Figure 1-4 on page 6 is a partial summary list of the many IBM technologies that will be categorized in this Redpaper. Chapter 1. Disaster Recovery Solution Selection Methodology 5
16 IBM eserver / TotalStorage Disaster Recovery Portfolio of Tools Applications Servers Site 1 Primary disk Common Timers Clustering Facilities Clustering Facilities Site 2 Mirrored disk Applications Servers eserver zseries: #2: Data Integrity Geographically Dispersed Parallel Sysplex (GDPS) - Tier 7 pseries: AIX/HACMP (High Availability Clustered Multi-Processors) with PRRC - (Tier 7) iseries: High Availability Business Partner software: Vision, Lakeview, DataMirror (Tier 7) xseries: X-Architecture, Blades (Tier 6) IBM TotalStorage ESS PPRC (Tier 6) ESS XRC (Tier 6) #1: Byte Movers Virtual Tape Server Peer to Peer (Tier 6) FAStT, SAN Volume Ctlr Mirroring (Tier 6) ESS, FAStT, SAN Volume Controller FlashCopy (Tier 4) 3590, 3592, LTO tape (Tier 1,2,3,4) Storage software (Tier 1,2,3,4) Software and Automation DB2, IMS, CICS, WebSphere (Tier 5) WebSphere, MQ (Tier 5) Tivoli Storage Manager (Tier 2,3,4) IGS, Business Partner Services #3: Transaction Integrity Networking and Infrastructure IBM Global Services, IBM Business Partners, IBM Networking Partners Figure 1-4 Portfolio of tools 1.4 Disaster Recovery Solution Selection Methodology tutorial So let's now go into detail about using this methodology. The following sections provide a tutorial and examples of using this methodology to more efficiently identify and select the Disaster Recovery technology that best fits your IT environment Flowchart of the methodology The Disaster Recovery Solution Selection Methodology is designed to provide a clear, understandable, flexible, and repeatable method to efficiently subset, organize, and select initial preliminary Disaster Recovery solution recommendations from the wide, possible portfolio of technologies. In Figure 1-5 on page 7 is a flowchart of our suggested methodology. 6 A Disaster Recovery Solution Selection Methodology
17 Flow of Disaster Recovery Solution Selection Methodology We need to be online 24x7 The Tiers of Disaster Recovery DR solution matrix Detailed DR solution description table CEO Hmm... That means Oracle and SAP must be recovered Risk Analysis results BIA / RTO RPO Analysis results Define the Tier level for each application Identify DR solution subset from DR solution matrix Eliminate DR solutions that do not apply to all requirements Valid preliminary candidate solution Business Requirements CO Figure 1-5 Flow of the Disaster Recovery Solution Selection Methodology Detailed Evaluation Team Note that the prerequisite to entering the methodology is having already performed and reached organizational agreement on the business requirements: Risk analysis, Business Impact Analysis, application segmentation, and associated Recovery Time Objectives and Recovery Point Objectives. The Disaster Recovery Solution Selection Methodology is designed to: Provide a methodology to quickly and repeatedly identify valid initial configuration options, which is intended to accelerate determining the final solution. Enforce asking of correct business and IT requirements questions for a proper Disaster Recovery configuration. Provide a convergence discussion methodology for the multiple products and IT disciplines that must make up an integrated Disaster Recovery solution. Be easily extendable as products and technologies evolve. Capture basic expert Disaster Recovery intellectual capital in a teachable, repeatable way, and provide a framework to consistently propagate these basic skills to a worldwide audience, remote or local Intended usage and limitations of the methodology The Disaster Recovery Solution Selection Methodology is intended to be used early in the selection cycle to establish a generalized vision of what are the requirements and what kinds of solutions and Disaster Recovery technologies to start investigating to solve any particular set of Disaster Recovery requirements. See Figure 1-6 on page 8. Chapter 1. Disaster Recovery Solution Selection Methodology 7
18 Intended Use of DR Solution Selection Methodology CEO We need to be online 24x7 Hmm... That means Oracle and SAP must be recovered CIO Promote asking of proper initial questions and collection of proper information The planning and evaluation cycle Evaluate the business environment Develop business strategy and initiatives Recognize needs Evaluate Options DR Solution Selection Methodology select Solution Option Resolve concerns and decide Detailed Evaluation Team Implement solution and evaluate success Identification of valid initial solution technologies and possibilities Turn over identified subset of possible solutions to evaluation team for detailed investigation and selection Figure 1-6 Intended use of Disaster Recovery Selection Methodology It is important to note what the Disaster Recovery Solution Selection Methodology cannot do: Not intended to replace detailed solution recommendation configuration assistance. Not intended to replace in-depth technical validation. Not intended to replace detailed design and implementation skills and services. The detailed evaluation team will perform those functions. The Disaster Recovery Solution Selection Methodology is not intended to be a perfect decision tree. Rather, it is a framework for efficiently organizing multiple Disaster Recovery technologies, and more quickly identifying the proper possible solutions for any given client set of requirements Hourglass concept in Disaster Recovery Solution Methodology The Disaster Recovery Solution Selection Methodology uses the following hourglass concept in its methodology. The hourglass concept allows us to organize and minimize the information that we need to gather in order to arrive at a valid solution, see Figure 1-7 on page 9. 8 A Disaster Recovery Solution Selection Methodology
19 Disaster Recovery Solution Selection Methodology: "Hourglass" Concept Start here Pick proper subset Solution 1 Solution 2 Solution 3 Solution 1a... Figure 1-7 Hourglass concept Solution 3a... A. Ask Specific Questions in Specific Order Ask proper high-level questions Application, platform, RTO, Distance, Connectivity, RPO, Vendor... Order of questions: Designed to eliminate many non-qualifying solutions up front Document answers B. Use RTO to pick appropriate solution subset Organize solutions by Tiers (creates RTO subset) C. From among subset, use question answers to eliminate non-solutions Apply answers gathered previously D. Turn over remaining valid solutions to detailed evaluation team As appropropriate, can then expand each solution to multiple flavors, tailoring for the client's exact needs 'Above the Neck' 'At the Neck' 'Below the Neck' By segmenting the asking of questions into this hourglass concept and these three categories, it becomes possible to efficiently subset the nearly endless permutations of possible Disaster Recovery technology combinations and solutions into a manageable, methodical process Steps in the Disaster Recovery Solution Selection Methodology Let s step through the concepts: Steps A through D. Step A: Ask specific questions in a specific order A series of business Disaster Recovery requirements questions is asked, in a specific order. With these questions, the basic environment, infrastructure, and desired recovery times for the Disaster Recovery solution are established. Below, we suggest a basic starter set of specific questions. Some of the questions will require the business line to answer them in their Risk and Business Impact Analysis. Other questions are for the Operations staff to answer from their knowledge of the IT infrastructure. Starter set of business requirements questions: 1. What is the application or applications that need to be recovered? 2. On what platform or platforms does it run? 3. What is the desired Recovery Time Objective? 4. What is the distance between the recovery sites (if there is one)? 5. What is the form of connectivity or infrastructure transport that will be used to transport the data to the recovery site? How much bandwidth is that? 6. What are the specific hardware and software configurations that need to be recovered? 7. What is the Recovery Point Objective? Chapter 1. Disaster Recovery Solution Selection Methodology 9
20 8. What is the amount of data that needs to be recovered? 9. What is the desired level of recovery (Planned/Unplanned/Transaction Integrity)? 10.Who will design the solution? 11.Who will implement the solution? These are not all the possible questions, of course, but they are a valid starting point. You can see additional questions in Appendix A, Disaster Recovery Solution Selection Methodology matrixes on page 29. Note that the specific order of the questions is by intent, designed to eliminate non-solutions even as we are performing the information gathering phase. The questions and how they are used in our hourglass concept are shown in the following chart in Figure 1-8. Step A: Ask Specific Questions in a Specific Order Step A: Start here, gather answers to proper questions 1. What applications or databases to recover? 2. What platform? (z, p, i, x and Windows, Linux, heterogeneous open, heterogeneous z+open) 3. What is desired Recovery Time Objective (RTO)? 4. What is distance between the sites? (if there are two sites) 5. What is the connectivity, infrastructure, and bandwidth between sites? 6. What are the specific h/w equipment(s) that needs to be recovered? 'Above the Neck' Step B: Identify proper possible solution subset 7. What is the Level of Recovery? - Planned Outage - Unplanned Outage - Transaction Integrity 'At the Neck' Step C: Eliminate non-solutions 8. What is the Recovery Point Objective? 9. What is the amount of data to be recovered (in GB or TB)? 10. Who will design the solution? (IGS, BP, client) 11. Who will implement the solution? (IGS, BP, client) 'Below the Neck' 12. Remaining solutions are valid choices to give to detailed evaluation team Figure 1-8 Step A: Ask specific questions in a specific order The questions above the neck of the hourglass define the basic business and IT requirements. It is essential that these basic questions be answered fully, because a lack of any of these answers means that it is not possible to properly evaluate what subset of solutions are the ones we should investigate. In this way, the methodology enforces the collection of proper business and infrastructure requirements before proceeding. We must assure that the answers to these questions have gained consensus from the enterprise s management, business lines, application staff, in addition to the IT operations staff. 10 A Disaster Recovery Solution Selection Methodology
21 Step B: Use Tier/RTO and Level of Recovery to identify solution subset We now are ready to identify the preliminary candidate solutions. To do that, let s review one final concept: the Level of Recovery (which is defined below). Note that each level builds on the previous level. The reason for the three levels, is to accommodate the fact that Disaster Recovery technology and solutions used will vary for Planned Outages versus Unplanned Outages versus Transaction Integrity. Planned Outage: The solution is required only to facilitate Planned Outages or data migrations. Unplanned Outage recovery is not necessary. Unplanned Outage: The solution is required, at the hardware and data integrity level, to facilitate Unplanned Outage recovery. It implies that Planned Outage support is also available in this solution. This level of recovery does not perform Transaction Integrity recovery at the application or database level. Transaction Integrity: The solution is required to provide Unplanned Outage recovery at the application and database Transaction Integrity level. This level relies on an underlying assumption that hardware level Planned Outage and Unplanned Outage support is also available. Having identified the appropriate Level of Recovery, and in combination with the RTO, we now reference the Solution Matrix in Appendix A, Disaster Recovery Solution Selection Methodology matrixes on page 29. An extract of the full Solution Matrix is shown for illustration purposes in Figure 1-9. Take the identified Level of Recovery and RTO answers, and look into the Solution Matrix chart. You ll immediately identify the intersect of the Level of Recovery with the RTO/Tier. At the intersect, in the contents of the intersection cell, are the initial candidate Disaster Recovery solutions for this particular RTO. Step B: Use Level of Outage and Tier/RTO to identify RTO Solution Subset B1. Use RTO, recovery level to select subset... Tier 7 Tier 6 Tier 4 RTO and Tiers tells me my "RTO Solution Subset" Planned Outages Unplanned Outages Transaction Integrity GDPS/PPRC GDPS/XRC PPRC, PPRC-XD XRC, GDPS Storage Mgr, ercmf, etc.. IMS RSR, Oracle, DB2-specific... PPRC-XD Point in Time FlashCopy, VTS Peer to Peer DB2-specific 'At the Neck' Disaster Recovery Solution Matrix (extract for illustration purposes) Figure 1-9 Step B: Identify candidate RTO solutions using tabular Tiers chart, RTO, and Level of Recovery Chapter 1. Disaster Recovery Solution Selection Methodology 11
22 In the illustration in Figure 1-9 on page 11, the identified preliminary candidate solutions are XRC, GDPS Storage Manager, and ercmf. Step C: Eliminate non-solutions Now that we have identified the preliminary candidate Disaster Recovery solutions, we eliminate non-solutions by applying the other answers gathered in Step A to the candidate solutions. For the solutions in this paper, we supply a starter set of the eliminate non-solutions in Appendix A, Disaster Recovery Solution Selection Methodology matrixes on page 29. An extract from that table is shown in Figure Step C: Eliminate Non-Solutions B1. Use RTO, recovery level to select subset... Tier 7 Tier 6 Tier 4 PPRC, PPRC-XD PPRC-XD Planned Outages Unplanned Outages Transaction Integrity GDPS/PPRC GDPS/XRC XRC, GDPS Storage Mgr, ercmf, etc.. IMS RSR, Oracle, DB2-specific... Point in Time FlashCopy, VTS Peer to Peer DB2-specific Lookup... My Questions and Answers eliminate non-solutions C. Use 'answers' to eliminate non-solutions XRC GDPS Storage Manager PPRC Platform zseries only zseries and z + Open heterogeneous ermcf Open Systems only... Distance any distance... < 103 km < 103 km Recovery Time 2-4 hours 1-4 hours 1-4 hours Objective Connectivity... ESCON ESCON ESCON Recovery Point few seconds to zero data loss zero data loss Objective few minutes Valid Option? No Yes No 'Below the Neck' Figure 1-10 Step C: Eliminate non-solutions Step D. Turn over Identified solutions to detailed evaluation team By applying the answers from Step A, on topics such as distance and non-support of platforms, those candidate solutions that do not apply will be eliminated. It is normal to have multiple possible solutions after we complete Step C. Whatever Disaster Recovery candidate solution or solutions remain after this pass through Step C are therefore a valid Disaster Recovery candidate solutions. Here we have completed our methodology Value of the Disaster Recovery Solution Selection Methodology As simple as this sounds, this process of quickly identifying proper candidate Disaster Recovery solutions for a given set of requirements is of significant value. 12 A Disaster Recovery Solution Selection Methodology
23 Much less time and skill is necessary to reach this preliminary solution identification in the evaluation cycle than would otherwise be experienced. This methodology can manage the preliminary evaluation phase more consistently and repeatedly, and can be easily taught to others. This methodology also supports our current best Disaster Recovery practices of segmenting the Disaster Recovery architecture into three blended tiers (and therefore three tiers of solutions). To identify the solutions for the other bands of solutions, you would simply re-run the methodology, and give the lower RTO Level of Recovery for those lower bands and applications; you would find the corresponding candidate solution technologies in the appropriate (lower) RTO solution subset cells Step D: Turn over identified solutions to detailed evaluation team Having identified a preliminary set of valid candidate Disaster Recovery solutions and technologies, we turn over this set of candidate solutions to a skilled evaluation team, made up of members qualified to contrast and compare the identified solutions in detail. The valid identified candidate solutions also dictate what mix of skills will be necessary on the evaluation team. The evaluation team will in all likelihood need to further configure the candidate solutions into more detailed configurations to complete the evaluation. This is also normal. In the end, that team will still make the final decision as to which of the identified options (or the blend of them) is the one that should be selected Updating the methodology as technology advances This methodology is flexible. Because of the table-driven format, as technology changes, only the contents of the Tiers chart will change; the methodology itself need not change. In particular, as Disaster Recovery technology is created or enhanced and results in an improvement of its tier of Disaster Recovery capability, this methodology simply: Adds the new technology to the appropriate RTO/Tier cell. Adds that solution as a column to the Eliminate Non-Solutions table. In most cases, the questions being asked in either Step A or Step B will not need to change. 1.5 An example: Using the DR Solution Selection Methodology To illustrate the use of the Disaster Recovery (DR) Solution Selection Methodology in practice, here is an example. Further examples are shown in Chapter 2, Sample scenarios on page Step A: Ask specific questions in a specific order The first step in any Disaster Recovery solution evaluation is to gather the appropriate business and IT infrastructure requirements by working within your organization to reach agreement on the following questions. Let us suppose that the answers to our starter set of Disaster Recovery Solution Selection Methodology questions turn out to be as follows: 1. What is the application or applications that need to be recovered? Heterogeneous Chapter 1. Disaster Recovery Solution Selection Methodology 13
24 2. On what platform or platforms does it run? zseries 3. What is the desired Recovery Time Objective? 3 hours 4. What is the distance between the recovery sites (if there is one)? 35 km 5. What is the form of connectivity or infrastructure transport that will be used to transport the data to the recovery site? How much bandwidth is that? ESCON, DWDM, bandwidth = 50 MB/sec 6. What are the specific vendor hardware and software configurations that need to be recovered? IBM ESS 7. What is the Recovery Point Objective? Near zero data loss 8. What is the amount of data that needs to be recovered? 4 TB 9. What is the desired level of recovery (Planned/Unplanned/Transaction Integrity)? Unplanned Integrity 10.Who will design the solution? To be determined 11.Who will implement the solution? To be determined After this information is obtained, we proceed to Step B Step B: Use level of outage and Tier/RTO to identify RTO solution subset We now apply our Tier/RTO and Level of Recovery to our Solution Matrix, a simplified version for illustration purposes is shown in Figure 1-11 on page 15. A full version of this table is in Appendix A, Disaster Recovery Solution Selection Methodology matrixes on page 29. Unplanned Level of Recovery Recovery Time Objective = Three hours 14 A Disaster Recovery Solution Selection Methodology
25 RTO ===> Description Planned Outage/ data migrations - byte movers Unplanned Outage D iaster R ecovery, adds data integrity to byte m overs Database and application Transaction Integrity - adds Transaction Integrity to Unplanned Outage data integrity Generally near continuous to 2 hours Highly automated integrated h/w s/w failover GDPS/PPRC, GDPS/XRC, AIX HACMP-XD with ESS PPRC, W indows GeoDistance DB2 with GDPS/PPRC Figure 1-11 IBM TotalStorage Disaster Recovery Solution Matrix By intersecting the Tier 6 RTO column with the Unplanned Outage row, we find that the preliminary candidate recommendations in our simplified table would be: XRC GDPS Storage Manager with PPRC ercmf Step C: Eliminate non-solutions , 3 2, 1 Generally 1 to 6 Generally 4 to 8 G enerally > 24 hours hours hours Storage and Server mirroring PPRC, PPRC-XD, XRC, VTS Peer to Peer XRC, GDPS Storage Manager with PPRC, ercmf S/W and database transaction integrity SAP, Oracle, DB2, SQL Server remote replication Generally Tier 4: 6-12 hours; Tier 3: hours H ot site, D isk PiT copy, Tivolio Storage Manager-DRM, fast tape FlashCopy, PPRC-XD, VTS Peer to Peer, Tivoli Storage Manager, tape Tier 4: VTS Peer to Peer, FlashCopy, FlashCopy Migration Manager, PPRC-XD, ercmf with PPRC-XD. Tier 3: FlashCopy, Tivoli Storage Manager, tape Tier 3: MS SQL Server database cluster with physical tape transport Backup software, tape Tivoli Storage Manager, tape Tivoli Storage Manager, tape We now use the information gathered in Step A for Step C: Eliminate non-solutions. We examine the Step C: Eliminate Non-Solutions table for this Tier 6 Unplanned Outages for which a starter set is supplied in Appendix A, Disaster Recovery Solution Selection Methodology matrixes on page 29. A simplified version of the Eliminate Non-Solutions table for the Tier 6 Unplanned Outage chart is shown in Figure 1-12 on page 16. Chapter 1. Disaster Recovery Solution Selection Methodology 15
26 Solution XRC GDPS Storage M anager with PPRC ercm F Platform zseries zseries, Hetereogeneous in c lu d in g z S e rie s Distance <40 km, km, >103 km < 40 km, km Connectivity ESCON, FICON ESCON, Fibre Channel Vendor (1) Vendor (2) RPO XRCcom pliant z/o S subsystem z/os subsystem Few seconds to fe w m in u te s PPRCc o m p lia n t subsystem Sam e vendor as PPRC subsystem Near zero Figure 1-12 Tier 6 Unplanned Outage Eliminate Non-Solutions table pseries, Linux, Sun, HP, M icrosoft W indows, Heterogeneous (open) <40 km, km ESCON, Fibre Channel IB M As we apply the different criteria sequentially from top to bottom, we find that: 1. Because the platform is IBM Sserver zseries, we can eliminate ercmf because that does not support zseries. 2. From a distance of 35 km, all remaining solutions qualify. 3. From a connectivity standpoint of ESCON, all remaining solutions qualify. 4. From a vendor hardware standpoint for site 1 of IBM ESS, all solutions qualify. 5. From a vendor hardware standpoint for site 2 of IBM ESS, all solutions qualify. 6. From a RPO standpoint of near zero, only GDPS Storage Manager with PPRC qualifies. Therefore, we see that after applying the answers to the identified candidates and eliminating non-solutions, this is the valid preliminary candidate solution: GDPS Storage Manager with ESS PPRC The methodology can often result in more than one possible solution. This is normal. IB M A m t o f D a ta Near zero Step D: Turn over identified preliminary solutions to evaluation team We would now turn over this solution or solutions to the detailed evaluation team in Step D. In all cases, whether we have identified one or multiple possible solutions, the detailed evaluation team step is necessary to validate this preliminary set of identified solutions, as well as accommodate a large variety of environment-specific considerations. As stated earlier, the methodology is not intended to be a perfect decision tree. This completes the methodology example. For additional examples, see the Chapter 2, Sample scenarios on page 19, in which a series of typical client Disaster Recovery requirements are distilled through this methodology, and a preliminary solution is identified. 16 A Disaster Recovery Solution Selection Methodology
27 1.6 Summary This methodology is meant as a framework and an organizational pattern for the efficient preliminary identification of proper Disaster Recovery solutions. This methodology is adaptable as technology or environment changes by updating the tables and questions used. It provides a consistent, teachable, repeatable method of locating the proper preliminary Disaster Recovery solutions. This methodology is not meant as a substitute for Disaster Recovery skill and experience, nor is it possible for the methodology to be a perfect decision tree. Although there clearly will be ambiguous circumstances (for which knowledgeable Disaster Recovery experts will be required), the methodology still provides for the collection of the proper Disaster Recovery business requirements information. In this way, the methodology provides an efficient process by which the initial preliminary Disaster Recovery solution selection can be consistently performed. In the end, this methodology should assist you in mentally organizing and using the information in this Redpaper, as well as navigating any Disaster Recovery technology evaluation process. Chapter 1. Disaster Recovery Solution Selection Methodology 17
28 18 A Disaster Recovery Solution Selection Methodology
29 2 Chapter 2. Sample scenarios This chapter examines various client scenarios. Application of the Disaster Recovery Solution Selection Methodology discussed in Chapter 1, Disaster Recovery Solution Selection Methodology on page 1, is applied to each of these client scenarios to illustrate identifying valid preliminary Disaster Recovery solution candidates. As detailed in Chapter 1, these preliminary identified candidate solutions should be expected to be further refined by a detailed evaluation team. Copyright IBM Corp All rights reserved. 19
30 2.1 Scenario 1: An efficient 24-hour recovery Some client applications, due to their nature, are tolerant of outages and can be quite satisfied with a 24-hour recovery. Let s examine one of these scenarios Step A: Client requirements To determine the client requirements, we start with Disaster Recovery Solution Selection Methodology Step A. Step A: Ask specific questions in a specific order The first step is to gather the appropriate business and IT infrastructure requirements by working within your organization to reach agreement on the following questions. Let us suppose that the answers to our starter set of Disaster Recovery Solution Selection Methodology questions turn out to be as follows: 1. What is the application or applications that need to be recovered? Heterogeneous 2. On what platform or platforms does it run? Various 3. What is the desired Recovery Time Objective? 24 hours 4. What is the distance between the recovery sites (if there is one)? 200 km 5. What is the form of connectivity or infrastructure transport that will be used to transport the data to the recovery site? How much bandwidth is that? Very low bandwidth envisioned 6. What are the specific vendor hardware and software configurations that need to be recovered? Large collection of different vendors 7. What is the Recovery Point Objective? 24 hours 8. What is the amount of data that needs to be recovered? 4 TB 9. What is the desired level of recovery (Planned Outage/Unplanned Outage/Transaction Integrity)? Unplanned Outage 10.Who will design the solution? To be determined 11.Who will implement the solution? To be determined Step B: Level of outage and Tier/RTO to identify RTO solution subset We now apply our Tier/RTO and Level of Recovery to the Solution Matrix in Appendix A, Disaster Recovery Solution Selection Methodology matrixes on page 29. A simplified version of that matrix is shown below for illustration purposes (Figure 2-1 on page 21). Recovery Time Objective = 24 hours Unplanned Outage Level of Recovery 20 A Disaster Recovery Solution Selection Methodology
31 RTO ===> Description Planned Outage/ data migrations - byte-movers Unplanned Outage Disaster Recovery, adds data integrity to byte-movers Database and application Transaction Integrity - adds Transaction Integrity to Unplanned Outage data integrity Generally near continuous to 2 hours Highly autom ated integrated h/w s/w failover GDPS/PPRC GDPS/XRC Database-level Transaction Integrity layered on top of automated h/w recovery Figure 2-1 IBM TotalStorage Disaster Recovery Solution Matrix By intersecting with the Tiers 3, 2 or 1 column and the Unplanned Outage row, we find that the preliminary candidate recommendations would be: IBM Tivoli Storage Manager Tape Step C: Eliminate non-solutions , 3 2, 1 Generally 1 to 6 Generally 4 to 8 Generally > 24 hours hours hours Storage and server m irroring PPRC, PPRC-XD, XRC, VTS Peer to Peer XRC, GDPS Storage Manager with PPRC, ercmf S/W and database transaction integrity SAP, Oracle, DB2, SQL Server rem ote replication Generally Tier 4: 6-12 hours; Tier 3: hours Hot site, D isk PiT copy, Tivoli Storage Managet-DRM, fast tape FlashCopy, PPRC-XD, VTS Peer to Peer, TSM, tape Tier 4: PtP VTS, FlashCopy, PPRC-XD. Tier 3: FlashCopy, Tivoli Storage Manager, tape Tier 4: Database transaction recovery with journal forwarding Tier 3: Database transaction recovery with physical tape or electronic vaulting Backup software, tape Tivoli Storage Manager, tape Tivoli Storage Manager, tape We apply the supplied Step C: Eliminate Non-Solutions table for this Tier 2 Unplanned Outages; see Appendix A, Disaster Recovery Solution Selection Methodology matrixes on page 29. A simplified version of the table is shown in Figure 2-2 for illustration purposes. Tier 2 Unplanned Outage - Eliminate Non-Solutions Solution Tape Platform Distance Connectivity Vendor (1) Tivoli Storage Manager Vendor (2) RPO Amt of data 1 to 8 hours, greater than 1 to 8 hours, greater 8 hours than 8 hours Figure 2-2 Tier 2 Unplanned Outage Eliminate Non-Solutions table Chapter 2. Sample scenarios 21
32 As we apply the different criteria sequentially from top to bottom, we find that there is no additional elimination of non-solutions. Therefore, we see that after applying the answers to the identified candidates and eliminating non-solutions, we are left with the valid candidate solutions from those covered in this Redpaper: Tivoli Storage Manager Tape These are the two solutions that we would then turn over to the evaluation team in Step D. It is probable that the evaluation team would end up using both Tivoli Storage Manager and tape to meet this particular environment s Disaster Recovery needs. 2.2 Scenario 2: A long distance recovery at Tier 4 Some client applications have a moderate tolerance of outages and can be acceptably recovered in perhaps hours. Let s examine one of these scenarios Step A: Client requirements To determine the client requirements, we start with Disaster Recovery Solution Selection Methodology Step A. Step A: Ask specific questions in a specific order The first step is to gather the appropriate business and IT infrastructure requirements by working within your organization to reach agreement on the following questions. For the following let us suppose that the answers to our starter set of DR Solution Selection Methodology questions turn out to be as follows: 1. What is the application or applications that need to be recovered? Heterogeneous 2. On what platform or platforms does it run? Open Systems 3. What is the desired Recovery Time Objective? 8 hours 4. What is the distance between the recovery sites (if there is one)? 1200 km 5. What is the form of connectivity or infrastructure transport that will be used to transport the data to the recovery site? How much bandwidth is that? Long distance telecom lines, Fibre Channel in the data center 6. What are the specific vendor hardware and software configurations that need to be recovered? IBM Enterprise Storage Server 7. What is the Recovery Point Objective? 8 hours 8. What is the amount of data that needs to be recovered? 4 TB 9. What is the desired level of recovery (Planned Outage/Unplanned Outage/Transaction Integrity)? Unplanned Outage 10.Who will design the solution? To be determined 11.Who will implement the solution? To be determined 22 A Disaster Recovery Solution Selection Methodology
33 2.2.2 Step B: Level of outage and Tier/RTO to identify RTO solution subset RTO ===> Description Planned Outage/ data migrations - byte movers Unplanned Outage Disaster Recovery, adds data integrity to byte m overs Database and application Transaction Integrity - adds Transaction Integrity to Unplanned Outage data integrity We now apply our Tier/RTO and Level of Recovery to the Solution Matrix in Appendix A, Disaster Recovery Solution Selection Methodology matrixes on page 29. A simplified version of that matrix is shown below for illustration purposes (Figure 2-3). Recovery Time Objective = 8 hours Unplanned Level of Recovery Generally near continuous to 2 hours Highly automated integrated h/w s/w failover GDPS/PPRC GDPS/XRC Database-level Transaction Integrity layered on automated h/w recovery Figure 2-3 Scenario 2: Solution Matrix By intersecting with the Tier 4 column and the Unplanned Outage row, we find that the preliminary candidate recommendations would be: PtP VTS FlashCopy (multiple disk subsystems) ESS PPRC-XD Step C: Eliminate non-solutions , 3 2, 1 Generally 1 to 6 Generally 4 to 8 Generally > 24 hours hours hours Storage and server m irroring PPRC, PPRC-XD, XRC, VTS Peer to Peer XRC, GDPS Storage Manager with PPRC, ercmf S/W and database transaction integrity SAP, O racle, DB2, SQL Server remote replication Generally Tier 4: 6-12 hours; Tier 3: hours Hot site, D isk PiT copy, Tivoli Storage Manager-DRM, fast tape FlashCopy, PPRC-XD, VTS Peer to Peer, TSM, tape Tier 4: PtP VTS, FlashCopy, PPRC-XD. Tier 3: FlashCopy, Tivoli Storage Manager, tape Tier 4: Database transaction recovery with journal forwarding Tier 3: Database transaction recovery with electronic vaulting or physical tape transport Backup software, tape Tivoli Storage Manager, tape Tivoli Storage Manager, tape For this Tier 4 Unplanned Outage set of requirements, we apply the supplied Step C: Eliminate Non-Solutions table. For illustration purposes, a simplified version of the appropriate Eliminate Non-Solutions table is shown in Figure 2-4 on page 24. A full version can be found in Appendix A, Disaster Recovery Solution Selection Methodology matrixes on page 29. Chapter 2. Sample scenarios 23
34 Tier 4 Unplanned Outage - Elim ina te Non-Solutions Solution PtP VTS PPRC-XD P la tfo rm zseries platform Distance distance distance ESCON, Fibre Connectivity ESCON, FICON Channel Vendor (1) IBM IBM Vendor (2) IBM IBM ESS FlashCopy platform distance connectivity IB M vendor RPO Few minutes to 1 hour, 1-8 hours, greater than 8 hours Few seconds to few minutes, few minutes to 1 hour, 1-8 hours, greater than 8 hours 1-8 hours, greater than 8 hours Am t of data Figure 2-4 Tier 4 Unplanned Outage Eliminate Non-Solutions table As we apply the different criteria sequentially from top to bottom, we find that: 1. Because the data is Open Systems, we eliminate PtP VTS. 2. There are no further eliminations. Therefore, these are the valid Disaster Recovery preliminary candidate solutions: ESS PPRC-XD FlashCopy These are the two solutions that we would then turn over to the evaluation team in Step D. It is probable that the evaluation team would end up investigating the usage of the two facilities (which are quite different), and choose one. If FlashCopy is chosen, it is likely that tape would also be configured into the solution. As you can see, the evaluation team s experience is what turns a very high-level preliminary selection into a valid final selection. 2.3 Scenario 3: Enterprise long distance recovery at Tier 6 Here, we have a large enterprise class client, who requires very fast recovery times Step A: Client requirements To determine the client requirements, we start with Disaster Recovery Solution Selection Methodology Step A. Step A: Ask specific questions in a specific order The first step is to gather the appropriate business and IT infrastructure requirements by working within your organization to reach agreement on the following questions. 24 A Disaster Recovery Solution Selection Methodology
35 For the following, let us suppose that the answers to our starter set of Disaster Recovery Solution Selection Methodology questions turn out to be as follows: 1. What is the application or applications that need to be recovered? Heterogeneous 2. On what platform or platforms does it run? zseries 3. What is the desired Recovery Time Objective? 3 hours 4. What is the distance between the recovery sites (if there is one)? 1200 km 5. What is the form of connectivity or infrastructure transport that will be used to transport the data to the recovery site? How much bandwidth is that? Long distance telecom lines, FICON in the data center 6. What are the specific vendor hardware and software configurations that need to be recovered? IBM Enterprise Storage Server, Hitachi Lightning 7. What is the Recovery Point Objective? Few seconds to few minutes 8. What is the amount of data that needs to be recovered? 4 TB 9. What is the desired level of recovery (Planned Outage/Unplanned Outage/Transaction Integrity)? Unplanned Outage 10.Who will design the solution? To be determined 11.Who will implement the solution? To be determined Step B: Level of outage and Tier/RTO to identify RTO solution subset We now apply our Tier/RTO and Level of Recovery. For illustration purposes, Figure 2-5 on page 26 is a simplified version of the full table that can be found in Appendix A, Disaster Recovery Solution Selection Methodology matrixes on page 29. Recovery Time Objective = 3 hours Unplanned Level of Recovery Chapter 2. Sample scenarios 25
36 RTO ===> Description Planned Outage/ data migrations - byte-movers Unplanned Outage Disaster Recovery, adds data integrity to byte-movers Database and application Transaction Integrity - adds Transaction Integrity to Unplanned Outage data integrity Figure 2-5 Solution Matrix Generally near continuous to 2 hours Highly autom ated integrated h/w s/w failover GDPS/PPRC GDPS/XRC Database transaction integrity layered on automated h/w recovery By intersecting the Tier 6 and Tier 7 columns, and the Unplanned Outage row, we find that the preliminary candidate Disaster Recovery solutions would be: XRC GDPS Storage Manager ermcf Step C: Eliminate non-solutions , 3 2, 1 Generally 1 to 6 Generally 4 to 8 Generally > 24 hours hours hours Storage and server m irroring PPRC, PPRC-XD, XRC, VTS Peer to Peer XRC, GDPS Storage Manager with PPRC, ercmf S/W and database transaction integrity SAP, O racle, DB2, SQL Server rem ote replication Generally Tier 4: 6-12 hours; Tier 3: hours H ot site, D isk PiT copy, TSM-DRM, fast tape FlashCopy, PPRC-XD, VTS Peer to Peer, Tivoli Storage Manager, tape Tier 4: PtP VTS, FlashCopy, PPRC-XD. Tier 3: FlashCopy, Tivoli Storage Manager, tape Tier 4: Database transaction recovery with journal forwarding Tier 3: Database transaction recovery electronic vaulting or physical tape transport Backup software, tape Tivoli Storage Manager, tape Tivoli Storage Manager, tape We apply the supplied Step C: Eliminate Non-Solutions table for this Tier 6 Unplanned Outages. A simplified version of the full table is in Figure 2-6 on page 27. See Appendix A, Disaster Recovery Solution Selection Methodology matrixes on page 29 for the full version. 26 A Disaster Recovery Solution Selection Methodology
37 Solution X R C GDPS Storage M anager with PPRC ercmf P la tfo rm zseries zseries, Hetereogeneous including zseries Distance <40 km, km, >103 km < 40 km, km Connectivity ESCON, FICON ESCON, Fibre Channel Vendor (1) XRC-compliant PPRC-compliant z/o S subsystem subsystem Vendor (2) z/os Sam e vendor subsystem PPRC subsystem RPO Few seconds to Near zero few m inutes Am t of data Figure 2-6 Scenario 3: Eliminate non-solutions Tier 6 Unplanned Outage As we apply the different criteria sequentially from top to bottom, we find that: 1. Because the platform is zseries, we can eliminate ercmf, because it does not support zseries. 2. At a distance of 1200 km, we eliminate those solutions that cannot reach this distance. Only XRC qualifies. 3. From a connectivity standpoint of FICON, XRC qualifies. 4. From a vendor hardware standpoint for site 1, XRC qualifies. 5. From a vendor hardware standpoint for site 2, XRC qualifies. 6. From a RPO standpoint of near zero, XRC qualifies. Therefore, we see that after applying the answers to the identified candidates and eliminating non-solutions, this is a valid preliminary candidate solution: XRC We would now turn over this solution to the detailed evaluation team in Step D for confirmation and detailed evaluation. pseries, Linux, S u n, H P, W indows, Heterogeneous (open only) <40 km, km ESCON, Fibre Channel IBM ESS IBM ESS Near zero Chapter 2. Sample scenarios 27
38 28 A Disaster Recovery Solution Selection Methodology
39 A Appendix A. Disaster Recovery Solution Selection Methodology matrixes This appendix provides the following tools for use with the Disaster Recovery Solution Selection Methodology described in Chapter 1, Disaster Recovery Solution Selection Methodology on page 1: Starter set of business requirement questions on page 30 provides the starter set of business requirements questions for the methodology. Disaster Recovery Solution Matrix on page 30 is the Solution Matrix that organizes the collection of IBM TotalStorage solutions in this Redpaper into tiers. Eliminate non-solutions matrixes on page 32 are the Eliminate Non-Solutions tables, one for each cell in the Solution Matrix. Additional questions useful for building business justification for the Disaster Recovery solution, as well as further information needed by the detailed evaluation team, are included in Additional business requirements questions on page 47. Copyright IBM Corp All rights reserved. 29
40 Starter set of business requirement questions Following is a suggested starter set of business Disaster Recovery requirements questions and answers to be obtained, prior to entering into the methodology. These are designed to elicit enough basic information to start the process. A detailed list of additional questions is supplied in Additional business requirements questions on page 47. Some of these questions will require the business line to answer them in a Risk and Business Impact Analysis. Other questions are for the operations staff to answer from their knowledge of the IT infrastructure. The starter set of business requirements questions is as follows: 1. What is the application or applications that need to be recovered? 2. On what platform or platforms does it run? 3. What is the desired Recovery Time Objective? 4. What is the distance between the recovery sites (if there is one)? 5. What is the form of connectivity or infrastructure transport that will be used to transport the data to the recovery site? How much bandwidth is that? 6. What are the specific hardware and software configurations that need to be recovered? 7. What is the Recovery Point Objective? 8. What is the amount of data that needs to be recovered? 9. What is the desired Level Of Recovery (Planned/Unplanned/Transaction Integrity)? 10.Who will design the solution? 11.Who will implement the solution? Disaster Recovery Solution Matrix The full Solution Matrix for use with the IBM TotalStorage solutions in this paper is the matrix shown in Table A-1 on page A Disaster Recovery Solution Selection Methodology
41 Table A-1 Disaster Recovery Solution Matrix Tier 7 Tier 6 Tier 5 Tiers 4,3 Tiers 2, 1 RTO Generally near continuous to 2 hours Generally 1 to 6 hours Generally 4 to 8 hours Generally Tier 4: 6-12 hrs Tier 3: hrs Generally > 24 hours Description Highly automated integrated hardware and software failover Storage and server mirroring Software, application, and database Transaction Integrity Hotsite, disk PiT copy, database journaling and forwarding, comprehensive backup s/w, fast tape, electronic vaulting Backup software, physical transport of tape Level of Recovery: Planned Outages, data migrations byte movers - GDPS/PPRC - GDPS/PPRC with HyperSwap - GDPS/XRC - AIX HACMP-XD with PPRC - Windows GeoDistance - PPRC, - PPRC-XD - XRC, - PtP VTS Software, application, and database level facilities - FlashCopy, - PPRC-XD, - PtP VTS - Tivoli Storage Manager - DRM, - tape - Tivoli Storage Manager - tape Level of Recovery: Unplanned Outage, adds data integrity to byte movers - GDPS/PPRC - GDPS/PPRC with HyperSwap - GDPS/XRC - AIX HACMP/XD with PPRC - Windows GeoDistance - XRC, - GDPS Storage Manager with PPRC, - ercmf - PPRC Migration Manager - AIX LVM - AIX HACMP Software, application, and database-level facilities Tier 4: - PtP VTS - FlashCopy - FlashCopy Manager - PPRC-XD - ercmf with PPRC-XD Tier 3: - FlashCopy - Tivoli Storage Manager - tape - Tivoli Storage Manager - tape Level of Recovery: Transaction Integrity, adds Transaction Integrity hardware Unplanned Outage data integrity - Database-level recovery on top of any Tier 7 Unplanned Outage recovery. Examples: DB2 with GDPS or AIX HACMP-XD, SAP and DB2 remote replication, shadow database with forward recovery, split mirror, etc. - Database-level recovery on top of any Tier 6 Unplanned Outage recovery. Examples: DB2 UDB with AIX HACMP/XD,SAP and DB2 remote replication, shadow database with forward recovery, split mirror, etc. - Remote replication with DB2, Oracle, SQL Server, etc. - Software, application, and database level facilities. Examples: shadow database with forward recovery, Split mirror, etc. - Tier 4: Database-level journal file forwarding and remote application - Tier 3: Database-level recovery with physical tape transport - Database-level recovery with physical tape transport Tolerance to outage Low tolerance to outage Low tolerance to outage Low tolerance to outage Somewhat tolerant to outage Very tolerant to outage Appendix A. Disaster Recovery Solution Selection Methodology matrixes 31
42 Notes on the Solution Matrix cells As a general comment, recall that the Disaster Recovery Solution Selection Methodology is not intended to be a perfect decision tree, and the boundaries and contents of the cells are of necessity giving general guideline suggestions rather than attempting to be all-inclusive. The methodology allows room for product and Disaster Recovery experts to add their expertise to the evaluation process after an initial preliminary set of candidate solutions is identified. The intent of the methodology is to provide a framework for efficiently organizing multiple Disaster Recovery technologies, and more quickly identifying the proper possible solutions for any given client set of requirements. Tiers 7, 6, and 5 Transaction Integrity The solutions for Transaction Integrity are specific to the database and application software being used. Because of this, the list of possible solutions is very broad, and it is not feasible to be all-inclusive. You should involve a software specialist skilled in the application and database set that you are using for detailed evaluation of Transaction Integrity recovery specific to your database and application. We do show common examples of solutions in these cells in the matrix. Eliminate non-solutions matrixes The following tables are used to eliminate non-solutions. There is one matrix set for each cell in the Solution Matrix. Tier 7 Planned Outage This is the matrix for Tier 7 and Planned Outage. Table A-2 Tier 7 and Planned Outage matrix Solution GDPS/PPRC GDPS/PPRC with HyperSwap AIX HACMP-XD with PPRC Windows GeoDistance Platform zseries zseries + Open zseries AIX Windows Distance <103 km <103 km <103 km <103 km Connectivity ESCON, Fibre Channel, FICON ESCON, Fibre Channel, FICON Fibre Channel, TCP/IP Fibre Channel, TCP/IP (primary site) PPRC-compliant PPRC HyperSwapcapable IBM ESS IBM ESS vendor (secondary site) PPRC-compliant PPRC HyperSwapcapable IBM ESS IBM ESS Recovery Point Objective Near zero Near zero Near zero Near zero Amount of data Other notes 32 A Disaster Recovery Solution Selection Methodology
43 Tier 7 Unplanned Outage This is the matrix for Tier 7 and Unplanned Outage. Table A-3 Tier 7 and Unplanned Outage matrix Solution GDPS/PPRC GDPS/PPRC with HyperSwap GDPS/XRC AIX HACMP-XD with PPRC Windows GeoDistance Platform zseries zseries + Open zseries zseries AIX Windows Distance <103 km <103 km Unlimited distance <103 km <103 km Connectivity ESCON, Fibre Channel, FICON ESCON, Fibre Channel, FiCON ESCON, Fibre Channel, FiCON Fibre Channel, TCP/IP Fibre Channel, TCP/IP (primary site) PPRC-compliant PPRC HyperSwapcompliant XRC-capable IBM ESS IBM ESS (secondary site) PPRC-compliant PPRC HyperSwapcompliant z/os supported IBM ESS IBM ESS Recovery Point Objective Near zero Near zero Near zero Near zero Near zero Amount of data Other notes Delivered as IBM Global Services Offering Delivered as IBM Global Services Offering Delivered as IBM Global Services Offering Appendix A. Disaster Recovery Solution Selection Methodology matrixes 33
44 Tier 7 Transaction Integrity This matrix is for Tier 7 and Transaction Integrity. For readability, the multiple columns for this matrix are separated into multiple parts, Parts 1 and 2. The solutions for Transaction Integrity are specific to the database and application software being used. Because of this, the list of possible solutions is very broad, and it is not feasible to be all-inclusive. You should involve a software specialist skilled in the application and database set that you are using for detailed evaluation of Transaction Integrity recovery specific to your database and application. We do show common examples of solutions in these cells in the matrix. Table A-4 Tier 7 and Transaction Integrity: Part 1 Solution Database transaction recovery layered on GDPS/PPRC Database transaction recovery layered on GDPS/PPRC with HyperSwap Database transaction recovery layered on AIX HACMP-XD with ESS PPRC Database transaction recovery layered on Windows GeoDistance Platform zseries, zseries + Open zseries pseries Windows Microsoft Clustering Distance <103 km <103 km <103 km Connectivity ESCON, Fibre Channel, FICON ESCON, Fibre Channel, FICON Fibre Channel, TCP/IP Fibre Channel, TCP/IP (primary site) PPRC-compliant PPRC HyperSwapcompliant IBM ESS IBM ESS (secondary site) PPRC-compliant PPRC HyperSwapcompliant IBM ESS IBM ESS Recovery Point Objective Near zero Near zero Near zero, few seconds to few minutes, few minutes to hours Near zero Amount of data Other notes Delivered as IBM Global Services Offering Delivered as IBM Global Services Offering 34 A Disaster Recovery Solution Selection Methodology
45 Table A-5 Tier 7 and Transaction Integrity: Part 2 Solution Shadow database with forward recovery Split Mirror database with PPRC Platform Distance <103 km Connectivity ESCON, Fibre Channel, FICON (primary site) (secondary site) Recovery Point Objective Depending on the log shipping mechanism, loss of only few transactions possible PPRC-compliant disk subsystem PPRC-compliant disk subsystem Near zero Amount of data Other notes Tier 6 Planned Outage For readability, the multiple columns for this matrix are separated into multiple parts, Parts 1 and 2. Table A-6 Tier 6 Planned Outage: Part 1 Solution PPRC PPRC-XD XRC Platform zseries Distance <103 km Connectivity ESCON, Fibre Channel ESCON, Fibre Channel FICON, ESCON (primary site) PPRC-compliant IBM ESS XRC-capable (secondary site) PPRC compliant IBM ESS z/os supported Recovery Point Objective Near zero Few seconds to few minutes Few seconds to few minutes Amount of data Other notes Appendix A. Disaster Recovery Solution Selection Methodology matrixes 35
46 Table A-7 Tier 6 Planned Outage: Part 2 Solution PtP VTS Synchronous PtP VTS Asynchronous Platform zseries zseries Distance <43 km Connectivity (primary site) (secondary site) Recovery Point Objective ESCON, Fibre Channel z/os-supported z/os-supported Near zero ESCON, Fibre Channel z/os-supported z/os-supported Few seconds to few minutes, minutes to hours (defined by user policy) Amount of Data Other notes Tier 6 Unplanned Outage For readability, the multiple columns for this matrix are separated into multiple parts, Parts 1 and 2. Table A-8 Tier 6 Unplanned Outage: Part 1 Solution XRC GDPS Storage Manager with PPRC ercmf Storage Manager with PPRC PPRC Migration Manager Platform zseries zseries Open System zseries Distance <103 km <103 km <103 km Connectivity FICON, ESCON Fibre Channel, TCP/IP Fibre Channel, TCP/IP ESCON, Fibre Channel Supported (primary site) XRC-capable PPRC-compliant IBM ESS IBM ESS Supported (secondary site) z/os-supported PPRC-compliant IBM ESS IBM ESS Recovery Point Objective Few seconds to few minutes Near zero Near zero Near zero Amount of data Other notes Delivered as IBM Global Services Offering Delivered as IBM Global Services Offering Lower cost special bid offering for circumstances that cannot justify GDPS solutions 36 A Disaster Recovery Solution Selection Methodology
47 Table A-9 Tier 6 Unplanned Outage: Part 2 Solution AIX LVM AIX HACMP AIX HACMP/XD Platform pseries pseries pseries Distance 10 km Metropolitan distances Connectivity Fibre Channel Fibre Channel, TCP/IP Fibre Channel, TCP/IP Supported (primary site) supported by AIX supported by AIX supported by AIX Supported (secondary site) supported by AIX supported by AIX supported by AIX Recovery Point Objective Near zero, few seconds to few minutes, minutes to hours (defined by user policy Near zero, few seconds to few minutes, minutes to hours (defined by user policy Near zero, few seconds to few minutes, minutes to hours (defined by user policy Amount of data Other notes Appendix A. Disaster Recovery Solution Selection Methodology matrixes 37
48 Tier 6 Transaction Integrity The solutions for Transaction Integrity are specific to the database and application software being used. Because of this, the list of possible solutions is very broad, and it is not feasible to be all-inclusive. You should involve a software specialist skilled in the application and database set that you are using for detailed evaluation of Transaction Integrity recovery specific to your database and application. We do show common examples of solutions in these cells in the matrix. This matrix shows examples for Tier 6 and Transaction Integrity. Table A-10 Tier 6 and Transaction Integrity Solution Database-level transaction recovery on top of any Tier 6 Unplanned Outage recovery Shadow database with forward recovery Split mirror database with PPRC Platform Database and application specific Distance Database and application specific <103 km Connectivity TCP/IP ESCON, Fibre Channel, FICON (primary site) (secondary site) PPRC-compliant disk subsystem PPRC-compliant disk subsystem Recovery Point Objective Near zero, few seconds to few minutes, minutes to hours (dependent on specific database, application, and hardware) Depending on the log shipping mechanism, loss of only few transactions possible Near zero Amount of data Other notes 38 A Disaster Recovery Solution Selection Methodology
49 Tier 5 Planned Outage The solutions in Tier 5 are specifically defined as database and application software functionalities for Planned, Unplanned, and Transaction Integrity recovery. These solutions are dependent on each individual software s capabilities. The scope of this paper is to focus on hardware and operating system-level IBM TotalStorage Disaster Recovery solutions. You should involve a software specialist skilled in the application and database set that you are using. However, as a general statement, robust databases have integrated software functionalities to enhance and minimize Planned Outages. Table A-11 Tier 5 Planned Outage Solution Platform Distance Connectivity (primary site) (secondary site) Recovery Point Objective Amount of data Software, application, and database-level facilities Software, application, and database specific Software, application, and database specific Fibre Channel, TCP/IP Software, application, and database specific, typically defined by software policy Other notes Appendix A. Disaster Recovery Solution Selection Methodology matrixes 39
50 Tier 5 Unplanned Outage The solutions in Tier 5 are specifically defined as database and application software functionalities for Unplanned and Transaction Integrity recovery. These solutions are dependent on each individual software s capabilities. The scope of this Redpaper is to focus on hardware and operating system level IBM TotalStorage Disaster Recovery solutions. You should involve a software specialist skilled in the application and database set that you are using. However, as a general statement, robust databases have integrated software functionalities to do Unplanned Outage recovery. Table A-12 Tier 5 Unplanned Outage Solution Platform Distance Connectivity (primary site) (secondary site) Recovery Point Objective Amount of data Software, application, and database-level facilities Software, application, and database specific Software, application, and database specific Fibre Channel, TCP/IP Software, application, and database specific, typically defined by software policy Other notes 40 A Disaster Recovery Solution Selection Methodology
51 Tier 5 Transaction Integrity The solutions in Tier 5 are specifically defined as database and application software functionalities for Transaction Integrity recovery. These solutions are dependent on each individual software s capabilities. The scope of this paper is to focus on hardware and operating system-level IBM TotalStorage Disaster Recovery solutions. You should involve a software specialist skilled in the application and database set that you are using. However, as a general statement, robust databases have integrated software functionalities to do remote replication. To maintain Transaction Integrity, the database functionality must be integrated into whatever replication architecture is being used. Table A-13 Tier 5 Transaction Integrity Solution Platform Distance Connectivity (primary site) (secondary site) Recovery Point Objective Amount of data Remote replication Transaction Integrity with DB2, Oracle, SQL Server, and so on Software, application, and database specific Software, application, and database specific Fibre Channel, TCP/IP - Near zero, few seconds to few minutes, minutes to hours - Dependent on user policy Other notes Appendix A. Disaster Recovery Solution Selection Methodology matrixes 41
52 Tiers 4 and 3 Planned Outage This matrix is for Tiers 4 and 3 and Planned Outage. Table A-14 Tiers 4 and 3 and Planned Outage matrix Solution FlashCopy PPRC-XD PtP VTS Tivoli Storage Manger - Disaster Recovery Manager Fast tape Platform zseries open Distance Connectivity (primary site) (secondary site) FlashCopycapable FlashCopycapable IBM ESS IBM ESS Recovery Point Objective Minutes to hours Minutes to hours Minutes to hours Minutes to hours Hours Amount of data Other notes Tier 4 Unplanned Outage This matrix is for Tier 4 and Unplanned Outage. Table A-15 Tier 4 and Unplanned Outage matrix Solution PtP VTS Asynch FlashCopy FlashCopy Manager PPRC-XD ercmf with PPRC-XD Platform zseries zseries Distance Connectivity FICON, ESCON N/A N/A Fibre Channel, ESCON Fibre Channel, ESCON (primary site) (secondary site) Recovery Point Objective IBM ESS IBM ESS IBM ESS IBM ESS Minutes to hours Minutes to hours Minutes to hours Minutes to hours Minutes to hours Amount of data Other notes IBM Storage Services Offering IBM Global Services Offering 42 A Disaster Recovery Solution Selection Methodology
53 Tier 4 Transaction Integrity This matrix is for Tier 4 and Transaction Integrity. Table A-16 Tier 4 and Transaction Integrity matrix Solution Platform Distance Connectivity (primary site) vendor (secondary site) Recovery Point Objective Amount of data Database-level journal file forwarding and remote application Software, application, and database specific software, application, and database specific Fibre Channel, TCP/IP - Minutes to hours - Dependent on user policy Other notes Tier 3 Unplanned Outage This matrix is for Tier 3 and Unplanned Outage. Table A-17 Tier 3 and Unplanned Outage matrix Solution FlashCopy Tivoli Storage Manager Tape Platform Distance Connectivity N/A TCP/IP N/A (primary site) FlashCopycapable (secondary site) FlashCopycapable Recovery Point Objective Minutes to hours Minutes to hours Minutes to hours Amount of data Other notes Appendix A. Disaster Recovery Solution Selection Methodology matrixes 43
54 Tier 3 Transaction Integrity This matrix is for Tier 3 and Transaction Integrity. Table A-18 Tier 3 and Transaction Integrity matrix Solution Platform Distance Connectivity (primary site) (secondary site) Recovery Point Objective Amount of data Database-level recovery using electronic tape vaulting Software, application, and database specific Software, application, and database specific Fibre Channel, TCP/IP - Minutes to hours - Dependent on user policy Other notes 44 A Disaster Recovery Solution Selection Methodology
55 Tiers 2 and 1 Planned Outage This matrix is for Tiers 2 and 1 and Planned Outage. Table A-19 Tiers 2 and 1 and Planned Outage matrix Solution Platform Distance Connectivity (primary site) (secondary site) Recovery Point Objective Tivoli Storage Manager Software, application, and database specific Software, application, and database specific Fibre Channel, TCP/IP - Minutes to hours - Dependent on user policy Tape - Minutes to hours - Dependent on user policy Amount of data Other notes Appendix A. Disaster Recovery Solution Selection Methodology matrixes 45
56 Tiers 2 and 1 Unplanned Outage This matrix is for Tiers 2 and 1 and Unplanned Outage. Table A-20 Tiers 2 and 1 and Unplanned Outage matrix Solution Platform Distance Connectivity (primary site) (secondary site) Recovery Point Objective Tivoli Storage Manager Software, application, and database specific Software, application, and database specific Fibre Channel, TCP/IP - Minutes to hours - Dependent on user policy Tape - Minutes to hours - Dependent on user policy Amount of data Other notes 46 A Disaster Recovery Solution Selection Methodology
57 Tiers 2 and 1 Transaction Integrity This matrix is for Tiers 2 and 1 and Transaction Integrity. Table A-21 Tiers 2 and 1 and Transaction Integrity matrix Solution Platform Distance Connectivity (primary site) (secondary site) Recovery Point Objective Amount of data Database-level recovery using physical tape transport Software, application, and database specific Software, application, and database specific N/A - Hours to days hours - Dependent on user policy Other notes Additional business requirements questions Following is a list of additional business requirement questions that can and should be answered prior to entering the Disaster Recovery Solution Selection Methodology. Justifying business continuance to the business Because Disaster Recovery solutions are by their very nature insurance, the following questions can help identify the ongoing daily payback value of a proposed Disaster Recovery solution. You might partially or fully justify the requested investment for Disaster Recovery to senior management by quantifying the following values, and then portraying the proposed Disaster Recovery solution cost as only a portion of the anticipated ongoing daily benefits, as identified by these questions. Tangible, compelling IT values Tangible, compelling IT values include the following benefits. Savings due to Planned Outage reductions 1. Benefits and savings, revenue increases, due to business being able to operate without the Planned Outage 2. Benefits in personnel productivity 3. Savings in removing overtime compensation, overtime savings for Planned Outages Appendix A. Disaster Recovery Solution Selection Methodology matrixes 47
58 Savings due to better testability/maintainability of recovery solution 1. Lowered cost for every test: Savings due to lowered system resource impact for test Savings due to better control of testing Savings due to better reliability in testing Savings due to better speed in test completion 2. Savings in maintainability costs, because GDPS insulates the Disaster Recovery method: From application changes From hard to define/hard to manage applications From hard to manage/inability to manage data Benefits of absolute confidence in switch or cutover 1. Better information flow to decision team due to automation messaging of status 2. Lowered cost of maintaining solution 3. Increased accuracy of test and switch due to automation Savings due to personnel cost reductions 1. Savings due to reduced labor and cost of a custom roll-your-own implementation. 2. Savings due to reduces labor costs due to automation. 3. Automation reduces salary/overtime cost of personnel to perform a recovery. 4. Pre-install and post-install difference in amount of staff required for change windows, Unplanned Outages, and practice and execute Disaster Recovery. 5. Savings because less costly and more available B and C personnel team can perform Planned/Unplanned Outage recovery. 6. Lowered skill requirements for operations or recovery team. 7. Survivability without requiring key personnel. Benefit of providing DR after large or server consolidation 1. Benefits of providing efficient, trustable recovery of large consolidated data center of servers /. Cost savings of bringing DR in-house versus out-sourced service provider 1. For same expenditure: Better recoverability, removal of dependencies on other service provider clients, no expiration time limit in recovery center. 2. Savings due to removal of out-sourced recovery center for equivalent functionality. Tangible, compelling business values Tangible, compelling business values include the following benefits. Strategic and competitive advantage 1. 24x7 Internet client availability required on new applications 2. Worldwide client availability required on new applications 3. Meet mandatory regulatory requirements 4. Avoidance of large $ impact to business of a disaster (client $1000/hr.) 5. Exploit existing investment in installed equipment 6. Future regulation compliance in affordable, strategic approach 48 A Disaster Recovery Solution Selection Methodology
59 Confidence 1. Regulatory agency confidence 2. Shareholder confidence 3. Financial markets confidence 4. Senior management confidence and trust in the recovery 5. Maintenance of brand image 6. Willingness to use the recovery or switch because of the switch Tactical 1. Employee idling labor cost 2. Cost of re-creation and recovery of lost data 3. Salaries paid to staff unable to undertake billable work 4. Salaries paid to staff to recover work backlog and maintain deadlines 5. Interest value on deferred billings 6. Penalty clauses invoked for late delivery and failure to meet service levels 7. Loss of interest on overnight balances; cost of interest on lost cash flow 8. Delays in client accounting, accounts receivable and billing/invoicing 9. Additional cost of working; administrative costs; travel and subsistence; and so on Intangible, compelling values: IT Intangible compelling values for IT include the following: 1. Value of Disaster Recovery strategy that resolves failed previous Disaster Recovery methods. 2. Personnel: Savings due to reduced number of administrators required per TB of disk Recruitment costs for new staff on staff turnover Training/retraining costs for staff 3. Confidence in recoverability because of: More frequent tests Success of tests 4. Planned Outage reductions creates new options in testing or site maintenance: Confidence and accuracy value due to more frequent testing Savings due to less expensive cost for testing High confidence in switch Value of prior and post Planned Outage minutes/year Business impact of Planned Outages/year (Planned Outage client cost * Planned Outage minutes) 5. Testing: Assuring successful recovery through increased frequency of testing Catching errors in recovery through increased frequency of testing Repeatability 6. Automation value: Repeatability Appendix A. Disaster Recovery Solution Selection Methodology matrixes 49
60 Trustability Intangible compelling values: Business Intangible compelling business values include the following benefits. Unplanned Outage revenue loss avoidances 1. Lost revenue 2. Loss of cash flow 3. Loss of clients (lifetime value of each) and market share 4. Loss of profits Unplanned Outage cost avoidances: IT 1. Cost of replacement of buildings and plant 2. Cost of replacing equipment 3. Cost of replacing software Unplanned Outage business impacts 1. Brand image recovery. 2. Fines and penalties for noncompliance. 3. Liability claims. 4. Additional cost of advertising, PR, and marketing to reassure clients and prospects to retain market share. 5. Loss of share value. 6. Loss of control over debtors. 7. Loss of credit control and increased bad debt. 8. Delayed achievement of benefits of profits from new projects or products. 9. Loss of revenue for service contracts from failure to provide service or meet service levels. 10.Lost ability to respond to contract opportunities. 11.Penalties from failure to produce annual accounts or produce timely tax payments. 12.Where company share value underpins loan facilities, share prices could drop and loans be called in or be re-rated at higher interest levels. 13.Additional cost of credit through reduced credit rating. Business requirements questions for detailed evaluation team The following list of questions and answers will need to be addressed by the detailed evaluation team in the course of quantifying, justifying, and designing the Disaster Recovery solution. Some questions are business in nature, others are IT or infrastructure in nature. They are the expanded super-set from which the basic starter set business requirements questions in Starter set of business requirement questions on page 30 are derived. We provide them here so that you can have a guideline for the types of information that will need to be gathered and analyzed by the detailed evaluation teams to finalize an in-depth recommendation. 50 A Disaster Recovery Solution Selection Methodology
61 Business profile 1. What is the client business/industry? 2. What is the compelling reason for the client to act at this time? 3. Who is the sponsor within the organization? 4. What is the budget that is allocated for this project? 5. When do they expect to have this implemented? 6. What are your goals that you feel are important for a successful project? 7. Which business sponsors do we need to engage with to properly determine the critical success factors for the project? 8. Will funding come from these mission-critical business sponsors or from within the previously constructed IT budget? Are funds allocated? 9. Have you designed an IT recovery program, which incorporates various speeds of recovery in the event of interruption? Who is your current business continuance provider? Current contract expiration date? 10.Does your recovery plan take into account any acceptable level of transaction data loss and data unrecoverable? Explain. 11.What would the financial impact be on the interruption to your company due to some unexpected, unplanned catastrophic event? 12.Which business processes require an advanced level of recoverability in the event of an unplanned medium to a long-term interruption of I/T services? 13.Do you back up all of your company s critical data on a regular basis? Frequency? If a declared disaster occurred, would you be ready and able to restore your company s critical data to the point of failure? 14.Are critical applications replicated offsite in case of disaster? Can you access the site quickly with your staff in the time you have established? 15.If you don t have a business continuance program in place, what is the motivating factor associated with this change in strategy? Why are you interested in doing this now? 16.What is your current yearly cost associated with business continuance? If internal, approximate cost. 17.What is your current time frame for the business continuance project? 18.What type of disk do you currently use? Manufacturer? Total capacity? Mixed environment? Utility S/W? Upgrade plans? Explain. 19.Can you supply a total inventory list of all current server hardware? 20.Is your company a current IBM Hot Site client? Disaster Recovery planning and infrastructure sizing 21.Has a sizing exercise been done? (Disk Magic for PPRC or XRC sizing, or both)? 22.Is the implementation for data migration or Disaster Recovery? 23.If the implementation is for data migration, is the plan to minimize the amount of time in duplex by using the hardware bit maps? 24.Has the client been made aware of the various Disaster Recovery documents and tools? 25.Will IBM Global Services or a Business Partner be involved in the implementation? 26.Has FlashCopy or some other Point in Time (PiT) copy been considered? Appendix A. Disaster Recovery Solution Selection Methodology matrixes 51
62 27.What is the current Disaster Recovery Objective (RTO or RPO)? 28.Recovery Time Objective (RTO)? What is your desired elapsed time objective from time of disaster until time of full recovery and accessibility to end users? (Includes database recovery time.) 29.Recovery Point Objective (RPO)? At the time that the RPO is complete, how much data is possible to recreate? (Measured in terms of seconds, minutes, and hours.) 30.How long does it take to Initial Program Load (IPL) the system following an unplanned system failure? 31.What is the critical application restart time after a system failure (after the system is IPLed)? 32.What is the planned system restart time under normal conditions (length of time to bring up your system)? 33.What is the planned system shutdown time (length of time to stop all applications and the system)? 34.What platforms are required to be recovered? z/os S/390 OS/390 VM VSE TPF Linux/390 UNIX IBM Sserver pseries RS/6000 AIX (non-clustered or clustered?) Sun Solaris (non-clustered or clustered?) HP-UX (non-clustered or clustered?) IBM Sserver iseries (AS/400, OS/400 ) IBM Sserver xseries Microsoft Windows NT Microsoft Windows 2000 Linux Other 35.What mirroring technologies will be used (ESS XRC, ESS PPRC, PtP VTS, other)? 36.Are coupling facilities being used? 37.How many/type/model/vendor? 38.Are facilities to handle data integrity included? 39.Are there adequate resources for managing Internet security and intrusion, with ongoing monitoring and management? 40.Is the IT recovery strategy in line with the business objectives? Does the business /or IT operations, or both, hinge on the availability of an individual person s skills? Primary side hardware 41.How many primary control units will be installed? 42.Who is the vendor? 43.How many volumes/luns are expected to be recovered? 52 A Disaster Recovery Solution Selection Methodology
63 44.What processors are installed? 45.How many/type/model/vendor? 46.Are there tape drives involved in this proposal? (If yes, describe.) Secondary side hardware 47.Is the secondary site client owned or are you using a business recovery center? If so, which one? Client owned? 48.How many secondary control units will be installed? 49.Who is the vendor? 50.How many volumes are expected? 51.What processors are installed? 52.How many/type/model/vendor? 53.Are there tape drives? (If yes, describe.) Performance 54.Has a bandwidth analysis been performed by collecting and analyzing data on the production applications? 55.What percentage of the workload is required to be mirrored? 56.What is the method of automation to be used (GDPS, other)? 57.Is cross-platform data consistency required? 58.What platforms? 59.What level of consistency? Connectivity 60.What is the distance to the remote site (miles or kilometers)? 61.What is the infrastructure to the remote site (Dark Fibre, Fibre provider/dwdm, Telecom line - what speed and flavor, T1-128 KBytes/sec., T3-5 Mbytes/sec, OC3-19 Mbytes/sec, IP)? 62.Will channel extenders be used? If so, which channel extender vendor is preferred (CNT, Cisco, McData, Brocade, other)? 63.What is the write update rate (MB/Sec, Ops/sec, how does it vary by time of day/month)? Appendix A. Disaster Recovery Solution Selection Methodology matrixes 53
64 54 A Disaster Recovery Solution Selection Methodology
65 Related publications The publications listed in this section are considered particularly suitable for a more detailed discussion of the topics covered in this Redpaper. IBM Redbooks For information about ordering these publications, see How to get IBM Redbooks on page 55. Note that some of the documents referenced here may be available in softcopy only. IBM TotalStorage Solutions for Disaster Recovery, SG The IBM TotalStorage Solutions Handbook, SG How to get IBM Redbooks You can search for, view, or download Redbooks, Redpapers, Hints and Tips, draft publications and Additional materials, as well as order hardcopy Redbooks or CD-ROMs, at this Web site: ibm.com/redbooks Help from IBM IBM Support and downloads ibm.com/support IBM Global Services ibm.com/services Copyright IBM Corp All rights reserved. 55
66 56 A Disaster Recovery Solution Selection Methodology
67 Index D Disaster Recovery business requirements questions 47 challenge in selecting a solution 2 eliminate non-solutions 32 example of Solution Selection Methodology 13 hourglass concept in methodology 8 nature of solutions 2 Solution Selection Methodology 6 Solution Selection Methodology steps 9 Tiers 3 usage of methodology 7 value of Solution Selection Methodology 12 Disaster Recovery Solution Selection Methodology hourglass concept 8 tutorial 6 Transaction Integrity matrix 34 Unplanned Outage matrix 33 Tiers blending 4 Disaster Recovery 3 tutorial Disaster Recovery Solution Selection Methodology 6 H hourglass concept 8 M Methodology example 13 steps 9 R Redbooks Web site 55 Contact us viii T Tier 2,1 Planned Outage matrix 45 Transaction Integrity matrix 47 Unplanned Outage matrix 46 Tier 3 Transaction Integrity matrix 44 Unplanned Outage matrix 43 Tier 4 Transaction Integrity matrix 43 Unplanned Outage matrix 42 Tier 4,3 Planned Outage matrix 42 Tier 5 Planned Outage 39 Transaction Integrity matrix 41 Unplanned Outage matrix 40 Tier 6 Planned Outage matrix 35 Transaction Integrity matrix 38 Unplanned Outage matrix 36 Tier 7 Planned Outage matrix 32 Copyright IBM Corp All rights reserved. 57
68 58 A Disaster Recovery Solution Selection Methodology
69
70 Back cover A Disaster Recovery Solution Selection Methodology Redpaper Learn and apply a Disaster Recovery Solution Selection Methodology How to find the right Disaster Recovery solution Working with IBM TotalStorage products There are a wide variety of IBM TotalStorage Disaster Recovery technologies and solutions. Each are very powerful in their own way, and each has their own unique characteristics. How can we select the optimum combination of solutions? How do we organize and manage all these valid Disaster Recovery technologies? These questions have vexed Disaster Recovery solution designers for a long time. Developing the skill to perform this selection function effectively was often time consuming and incomplete. It can be difficult to transfer these skills to other colleagues. In this Redpaper, we offer a suggested Disaster Recovery Solution Selection Methodology that is designed to provide assistance to this problem. The intent of our methodology is to allow us to navigate the seemingly endless permutations of Disaster Recovery technology quickly and efficiently, and to identify initial preliminary, valid, cost-justified solutions. This methodology is not designed to replace in-depth skills. It is meant as a guideline and a framework. Proper application of this methodology can significantly reduce the effort and time required to identify proper solutions, and therefore accelerate the selection cycle. For more information about this methodology, see the redbook IBM TotalStorage Solutions for Disaster Recovery, SG INTERNATIONAL TECHNICAL SUPPORT ORGANIZATION BUILDING TECHNICAL INFORMATION BASED ON PRACTICAL EXPERIENCE IBM Redbooks are developed by the IBM International Technical Support Organization. Experts from IBM, Customers and Partners from around the world create timely technical information based on realistic scenarios. Specific recommendations are provided to help you implement IT solutions more effectively in your environment. For more information: ibm.com/redbooks
How To Choose A Business Continuity Solution
A Business Continuity Solution Selection Methodology Ellis Holman IBM Corp. Tuesday, March 13, 2012 Session Number 10387 Disclaimer Copyright IBM Corporation 2010. All rights reserved. U.S. Government
Disaster Recovery Procedures for Microsoft SQL 2000 and 2005 using N series
Redpaper Alex Osuna Bert Jonker Richard Waal Henk Vonk Peter Beijer Disaster Recovery Procedures for Microsoft SQL 2000 and 2005 using N series Introduction This IBM Redpaper gives a example of procedures
Business Resilience for the On Demand World Yvette Ray Practice Executive Business Continuity and Resiliency Services
Business Resilience for the On Demand World Yvette Ray Practice Executive Business Continuity and Resiliency Services What s on the minds of 450 of the world s leading CEOs 2 CEO needs Revenue growth with
IBM Tivoli Storage FlashCopy Manager Overview Wolfgang Hitzler Technical Sales IBM Tivoli Storage Management [email protected]
IBM Tivoli Storage FlashCopy Manager Overview Wolfgang Hitzler Technical Sales IBM Tivoli Storage Management [email protected] Why Snapshots Are Useful for Backup Faster backups without taking applications
Redbooks Paper. Local versus Remote Database Access: A Performance Test. Victor Chao Leticia Cruz Nin Lei
Redbooks Paper Victor Chao Leticia Cruz Nin Lei Local versus Remote Database Access: A Performance Test When tuning a database for better performance, one area to examine is the proximity of the database
Rapid Data Backup and Restore Using NFS on IBM ProtecTIER TS7620 Deduplication Appliance Express IBM Redbooks Solution Guide
Rapid Data Backup and Restore Using NFS on IBM ProtecTIER TS7620 Deduplication Appliance Express IBM Redbooks Solution Guide This IBM Redbooks Solution Guide provides an overview of how data backup and
IBM Systems and Technology Group Technical Conference
IBM TRAINING IBM STG Technical Conference IBM Systems and Technology Group Technical Conference Munich, Germany April 16 20, 2007 IBM TRAINING IBM STG Technical Conference E72 Storage options and Disaster
IBM Financial Transaction Manager for ACH Services IBM Redbooks Solution Guide
IBM Financial Transaction Manager for ACH Services IBM Redbooks Solution Guide Automated Clearing House (ACH) payment volume is on the rise. NACHA, the electronic payments organization, estimates that
IBM DB2 Data Archive Expert for z/os:
Front cover IBM DB2 Data Archive Expert for z/os: Put Your Data in Its Place Reduce disk occupancy by removing unused data Streamline operations and improve performance Filter and associate data with DB2
Redbooks Redpaper. IBM TotalStorage NAS Advantages of the Windows Powered OS. Roland Tretau
Redbooks Redpaper Roland Tretau IBM TotalStorage NAS Advantages of the Windows Powered OS Copyright IBM Corp. 2002. All rights reserved. ibm.com/redbooks 1 What is Network Attached Storage (NAS) Storage
IBM Tivoli Web Response Monitor
IBM Tivoli Web Response Monitor Release Notes Version 2.0.0 GI11-4068-00 +---- Note ------------------------------------------------------------+ Before using this information and the product it supports,
Lisa Gundy IBM Corporation. Wednesday, March 12, 2014: [email protected]. 11:00 AM 12:00 PM Session 15077
Continuing the understanding of IBM Copy Services: Peer-to-Peer-Remote-Copy (PPRC) and Point in Time Copy (FlashCopy) for High Availability (HA) and Disaster Recovery (DR) Lisa Gundy IBM Corporation [email protected]
QLogic 4Gb Fibre Channel Expansion Card (CIOv) for IBM BladeCenter IBM BladeCenter at-a-glance guide
QLogic 4Gb Fibre Channel Expansion Card (CIOv) for IBM BladeCenter IBM BladeCenter at-a-glance guide The QLogic 4Gb Fibre Channel Expansion Card (CIOv) for BladeCenter enables you to quickly and simply
Integrating ERP and CRM Applications with IBM WebSphere Cast Iron IBM Redbooks Solution Guide
Integrating ERP and CRM Applications with IBM WebSphere Cast Iron IBM Redbooks Solution Guide Cloud computing has become a business evolution that is impacting all facets of business today, including sales,
Platform LSF Version 9 Release 1.2. Migrating on Windows SC27-5317-02
Platform LSF Version 9 Release 1.2 Migrating on Windows SC27-5317-02 Platform LSF Version 9 Release 1.2 Migrating on Windows SC27-5317-02 Note Before using this information and the product it supports,
Redpaper. IBM Workplace Collaborative Learning 2.5. A Guide to Skills Management. Front cover. ibm.com/redbooks. Using the skills dictionary
Front cover IBM Workplace Collaborative Learning 2.5 A Guide to Skills Management Using the skills dictionary Using the Career Development portlet and creating a Learning Plan Generating reports for Skills
Case Study: Process SOA Scenario
Redpaper Martin Keen Michele Chilanti Veronique Moses Scott Simmons Srinivasan Vembakkam Case Study: Process SOA Scenario This paper one in a series of service-oriented architecture (SOA) papers that feature
Tivoli Endpoint Manager for Security and Compliance Analytics. Setup Guide
Tivoli Endpoint Manager for Security and Compliance Analytics Setup Guide Setup Guide i Note: Before using this information and the product it supports, read the information in Notices. Copyright IBM Corporation
Disaster Recovery Solutions
Front cover Disaster Recovery Solutions for IBM TotalStorage SAN File System Protect your SAN File System from disaster Use advanced disk replication solutions Step by step instructions Charlotte Brooks
Big Data Analytics with IBM Cognos BI Dynamic Query IBM Redbooks Solution Guide
Big Data Analytics with IBM Cognos BI Dynamic Query IBM Redbooks Solution Guide IBM Cognos Business Intelligence (BI) helps you make better and smarter business decisions faster. Advanced visualization
IBM Cognos Controller Version 10.2.1. New Features Guide
IBM Cognos Controller Version 10.2.1 New Features Guide Note Before using this information and the product it supports, read the information in Notices on page 3. Product Information This document applies
IBM Enterprise Marketing Management. Domain Name Options for Email
IBM Enterprise Marketing Management Domain Name Options for Email Note Before using this information and the products that it supports, read the information in Notices on page 3. This document applies
Getting Started with IBM Bluemix: Web Application Hosting Scenario on Java Liberty IBM Redbooks Solution Guide
Getting Started with IBM Bluemix: Web Application Hosting Scenario on Java Liberty IBM Redbooks Solution Guide Based on the open source Cloud Foundry technology, IBM Bluemix is an open-standard, cloud-based
Release Notes. IBM Tivoli Identity Manager Oracle Database Adapter. Version 5.0.1. First Edition (December 7, 2007)
IBM Tivoli Identity Manager Version 5.0.1 First Edition (December 7, 2007) This edition applies to version 5.0 of Tivoli Identity Manager and to all subsequent releases and modifications until otherwise
IBM Replication Solutions for Business Continuity Part 1 of 2 TotalStorage Productivity Center for Replication (TPC-R) FlashCopy Manager/PPRC Manager
IBM Replication Solutions for Business Continuity Part 1 of 2 TotalStorage Productivity Center for Replication (TPC-R) FlashCopy Manager/PPRC Manager Scott Drummond IBM Corporation [email protected] Jeff
IBM Enterprise Content Management Software Requirements
IBM Enterprise Content Management Software Requirements This document describes the software prerequisite requirements for the IBM Enterprise Content Management suite of products. Last Updated: May 31,
Patch Management for Red Hat Enterprise Linux. User s Guide
Patch Management for Red Hat Enterprise Linux User s Guide User s Guide i Note: Before using this information and the product it supports, read the information in Notices. Copyright IBM Corporation 2003,
IBM FileNet Capture and IBM Datacap
Front cover IBM FileNet Capture and IBM Datacap Kevin Bowe Redpaper Introduction This IBM Redpaper publication has various objectives. It uses a fictional capture processing scenario to identify the differences
IBM Security QRadar Version 7.1.0 (MR1) Checking the Integrity of Event and Flow Logs Technical Note
IBM Security QRadar Version 7.1.0 (MR1) Checking the Integrity of Event and Flow Logs Technical Note Note: Before using this information and the product that it supports, read the information in Notices
Tivoli Endpoint Manager for Security and Compliance Analytics
Tivoli Endpoint Manager for Security and Compliance Analytics User s Guide User s Guide i Note: Before using this information and the product it supports, read the information in Notices. Copyright IBM
Active Directory Synchronization with Lotus ADSync
Redbooks Paper Active Directory Synchronization with Lotus ADSync Billy Boykin Tommi Tulisalo The Active Directory Synchronization tool, or ADSync, allows Active Directory administrators to manage (register,
Brocade Enterprise 20-port, 20-port, and 10-port 8Gb SAN Switch Modules IBM BladeCenter at-a-glance guide
Brocade Enterprise 20-port, 20-port, and 10-port 8Gb SAN Switch Modules IBM BladeCenter at-a-glance guide The Brocade Enterprise 20-port, 20-port, and 10-port 8 Gb SAN Switch Modules for IBM BladeCenter
IBM TRIRIGA Application Platform Version 3.3.2. Reporting: Creating Cross-Tab Reports in BIRT
IBM TRIRIGA Application Platform Version 3.3.2 Reporting: Creating Cross-Tab Reports in BIRT Cheng Yang Application Developer IBM TRIRIGA Copyright International Business Machines Corporation 2013. US
Tivoli Security Compliance Manager. Version 5.1 April, 2006. Collector and Message Reference Addendum
Tivoli Security Compliance Manager Version 5.1 April, 2006 Collector and Message Reference Addendum Copyright International Business Machines Corporation 2006. All rights reserved. US Government Users
Getting Started With IBM Cúram Universal Access Entry Edition
IBM Cúram Social Program Management Getting Started With IBM Cúram Universal Access Entry Edition Version 6.0.5 IBM Cúram Social Program Management Getting Started With IBM Cúram Universal Access Entry
Tivoli Endpoint Manager for Configuration Management. User s Guide
Tivoli Endpoint Manager for Configuration Management User s Guide User s Guide i Note: Before using this information and the product it supports, read the information in Notices. Copyright IBM Corporation
Version 8.2. Tivoli Endpoint Manager for Asset Discovery User's Guide
Version 8.2 Tivoli Endpoint Manager for Asset Discovery User's Guide Version 8.2 Tivoli Endpoint Manager for Asset Discovery User's Guide Note Before using this information and the product it supports,
QLogic 8Gb FC Single-port and Dual-port HBAs for IBM System x IBM System x at-a-glance guide
QLogic 8Gb FC Single-port and Dual-port HBAs for IBM System x IBM System x at-a-glance guide The QLogic 8Gb FC Single-port and Dual-port HBA for IBM System x are PCI Express 2.0 x8 8Gb Fibre Channel adapters
IBM Enterprise Marketing Management. Domain Name Options for Email
IBM Enterprise Marketing Management Domain Name Options for Email Note Before using this information and the product it supports, read the information in Notices on page 3. This document applies to all
Long-Distance Configurations for MSCS with IBM Enterprise Storage Server
Long-Distance Configurations for MSCS with IBM Enterprise Storage Server Torsten Rothenwaldt IBM Germany Presentation 2E06 Agenda Cluster problems to resolve in long-distance configurations Stretched MSCS
Redpaper. IBM Tivoli Storage Manager: Bare Machine Recovery for. Front cover. ibm.com/redbooks
Front cover IBM Tivoli Storage Manager: Bare Machine Recovery for Windows with Cristie BMR Use Cristie BMR with ITSM, to protect your Windows environment Learn how to configure your system for recovery
Emulex 8Gb Fibre Channel Expansion Card (CIOv) for IBM BladeCenter IBM BladeCenter at-a-glance guide
Emulex 8Gb Fibre Channel Expansion Card (CIOv) for IBM BladeCenter IBM BladeCenter at-a-glance guide The Emulex 8Gb Fibre Channel Expansion Card (CIOv) for IBM BladeCenter enables high-performance connection
IBM z13 for Mobile Applications
IBM z13 for Mobile Applications Octavian Lascu Mobile Adopt IBM z Systems Solution Guide IBM z13 for Mobile Applications IBM Redbooks Solution Guide In today s mobile era, over 10 billion devices are accessing
Alternate Methods of TSM Disaster Recovery: Exploiting Export/Import Functionality
Alternate Methods of TSM Disaster Recovery: Exploiting Export/Import Functionality Presented by: Eric Gruber TSM Sr. Architect, TSM Certified Consultant www.ckaonline.com Value Recovery Time Tiers Best
OS Deployment V2.0. User s Guide
OS Deployment V2.0 User s Guide User s Guide i Note: Before using this information and the product it supports, read the information in Notices. Copyright IBM Corporation 2003, 2011. US Government Users
IBM PowerSC Technical Overview IBM Redbooks Solution Guide
IBM PowerSC Technical Overview IBM Redbooks Solution Guide Security control and compliance are some of the key components that are needed to defend the virtualized data center and cloud infrastructure
Data Protection with IBM TotalStorage NAS and NSI Double- Take Data Replication Software
Data Protection with IBM TotalStorage NAS and NSI Double- Take Data Replication September 2002 IBM Storage Products Division Raleigh, NC http://www.storage.ibm.com Table of contents Introduction... 3 Key
Front cover Smarter Backup and Recovery Management for Big Data with Tectrade Helix Protect
Front cover Smarter Backup and Recovery Management for Big Data with Tectrade Helix Protect Redguides for Business Leaders Ken Hogan See how to cut the cost and complexity of protecting large data volumes
Tivoli IBM Tivoli Monitoring for Transaction Performance
Tivoli IBM Tivoli Monitoring for Transaction Performance Version 5.3.0 Evaluation Guide GC32-9190-00 Tivoli IBM Tivoli Monitoring for Transaction Performance Version 5.3.0 Evaluation Guide GC32-9190-00
FICON Extended Distance Solution (FEDS)
IBM ^ zseries Extended Distance Solution (FEDS) The Optimal Transport Solution for Backup and Recovery in a Metropolitan Network Author: Brian Fallon [email protected] FEDS: The Optimal Transport Solution
CS z/os Application Enhancements: Introduction to Advanced Encryption Standards (AES)
Software Group Enterprise Networking and Transformation Solutions (ENTS) CS z/os Application Enhancements: Introduction to Advanced Encryption Standards (AES) 1 A little background information on cipher
IBM Security SiteProtector System Migration Utility Guide
IBM Security IBM Security SiteProtector System Migration Utility Guide Version 3.0 Note Before using this information and the product it supports, read the information in Notices on page 5. This edition
Creating Applications in Bluemix using the Microservices Approach IBM Redbooks Solution Guide
Creating Applications in Bluemix using the Microservices Approach IBM Redbooks Solution Guide Across 2014 and into 2015, microservices became the new buzzword for application development style. So what
IBM TRIRIGA Version 10 Release 4.2. Inventory Management User Guide IBM
IBM TRIRIGA Version 10 Release 4.2 Inventory Management User Guide IBM Note Before using this information and the product it supports, read the information in Notices on page 19. This edition applies to
IBM Rational Rhapsody NoMagic Magicdraw: Integration Page 1/9. MagicDraw UML - IBM Rational Rhapsody. Integration
IBM Rational Rhapsody NoMagic Magicdraw: Integration Page 1/9 MagicDraw UML - IBM Rational Rhapsody Integration IBM Rational Rhapsody NoMagic Magicdraw: Integration Page 2/9 Notices Copyright IBM Corporation
IBM VisualAge for Java,Version3.5. Remote Access to Tool API
IBM VisualAge for Java,Version3.5 Remote Access to Tool API Note! Before using this information and the product it supports, be sure to read the general information under Notices. Edition notice This edition
Cúram Business Intelligence and Analytics Guide
IBM Cúram Social Program Management Cúram Business Intelligence and Analytics Guide Version 6.0.4 Note Before using this information and the product it supports, read the information in Notices at the
IBM RDX USB 3.0 Disk Backup Solution IBM Redbooks Product Guide
IBM RDX USB 3.0 Disk Backup Solution IBM Redbooks Product Guide The new IBM Removable Disk EXchange (RDX) USB 3.0 removable disk backup solution is designed to address your increasing capacity and backup
IBM Endpoint Manager Version 9.2. Software Use Analysis Upgrading Guide
IBM Endpoint Manager Version 9.2 Software Use Analysis Upgrading Guide IBM Endpoint Manager Version 9.2 Software Use Analysis Upgrading Guide Upgrading Guide This edition applies to IBM Endpoint Manager
High Performance Computing Cloud Offerings from IBM Technical Computing IBM Redbooks Solution Guide
High Performance Computing Cloud Offerings from IBM Technical Computing IBM Redbooks Solution Guide The extraordinary demands that engineering, scientific, and research organizations place upon big data
IBM Lotus Enterprise Integrator (LEI) for Domino. Version 8.5.2. August 17, 2010
IBM Lotus Enterprise Integrator (LEI) for Domino Version 8.5.2 August 17, 2010 A) What's new in LEI V8.5.2 B) System requirements C) Installation considerations D) Operational considerations E) What's
Maximizing Backup and Restore Performance of Large Databases
Maximizing Backup and Restore Performance of Large Databases - 1 - Forward (from Meta Group) Most companies critical data is being stored within relational databases. Over 90% of all mission critical systems,
IBM Flex System PCIe Expansion Node IBM Redbooks Product Guide
IBM Flex System PCIe Expansion Node IBM Redbooks Product Guide The IBM Flex System PCIe Expansion Node provides the ability to attach additional PCI Express cards, such as High IOPS SSD adapters, fabric
DB2 Database Demonstration Program Version 9.7 Installation and Quick Reference Guide
DB2 Database Demonstration Program Version 9.7 Installation and Quick Reference Guide George Baklarz DB2 Worldwide Technical Sales Support IBM Toronto Laboratory DB2 Demonstration Program Version 9.7 Usage
Installing on Windows
Platform LSF Version 9 Release 1.1 Installing on Windows SC27-5316-01 Platform LSF Version 9 Release 1.1 Installing on Windows SC27-5316-01 Note Before using this information and the product it supports,
Remote Support Proxy Installation and User's Guide
IBM XIV Storage System Remote Support Proxy Installation and User's Guide Version 1.1 GA32-0795-01 IBM XIV Storage System Remote Support Proxy Installation and User's Guide Version 1.1 GA32-0795-01 Note
IBM Security QRadar Version 7.2.0. Installing QRadar with a Bootable USB Flash-drive Technical Note
IBM Security QRadar Version 7.2.0 Installing QRadar with a Bootable USB Flash-drive Technical Note Note: Before using this information and the product that it supports, read the information in Notices
Redpaper. IBM Tivoli Storage Manager: Bare Machine Recovery for AIX with SysBack. Front cover. ibm.com/redbooks
Front cover IBM Tivoli Storage Manager: Bare Machine Recovery for AIX with SysBack Use SYSBACK with ITSM, to protect your AIX environment Learn how to configure your system for recovery Secure your AIX
IBM Cognos Controller Version 10.2.0. New Features Guide
IBM Cognos Controller Version 10.2.0 New Features Guide Note Before using this information and the product it supports, read the information in Notices on page 9. Product Information This document applies
IBM Security QRadar Version 7.1.0 (MR1) Replacing the SSL Certificate Technical Note
IBM Security QRadar Version 7.1.0 (MR1) Technical Note Note: Before using this information and the product that it supports, read the information in Notices and Trademarks on page 5 Copyright IBM Corp.
IBM Configuring Rational Insight 1.0.1.1 and later for Rational Asset Manager
IBM Configuring Rational Insight 1.0.1.1 and later for Rational Asset Manager Rational Insight and Rational Asset Manager...4 Prerequisites...5 Configuring the XML data configuration for Rational Asset
IBM Flex System FC5022 2-port 16Gb FC Adapter IBM Redbooks Product Guide
IBM Flex System FC5022 2-port 16Gb FC Adapter IBM Redbooks Product Guide The network architecture on the IBM Flex System platform has been specifically designed to address network challenges, giving you
IBM SmartCloud Analytics - Log Analysis. Anomaly App. Version 1.2
IBM SmartCloud Analytics - Log Analysis Anomaly App Version 1.2 IBM SmartCloud Analytics - Log Analysis Anomaly App Version 1.2 Note Before using this information and the product it supports, read the
Installing and Configuring DB2 10, WebSphere Application Server v8 & Maximo Asset Management
IBM Tivoli Software Maximo Asset Management Installing and Configuring DB2 10, WebSphere Application Server v8 & Maximo Asset Management Document version 1.0 Rick McGovern Staff Software Engineer IBM Maximo
Exam : IBM 000-061. : IBM NEDC Technical Leader. Version : R6.1
Exam : IBM 000-061 Title : IBM NEDC Technical Leader Version : R6.1 Prepking - King of Computer Certification Important Information, Please Read Carefully Other Prepking products A) Offline Testing engine
IBM FileNet System Monitor 4.0.1.5. FSM Event Integration Whitepaper SC19-3116-00
IBM FileNet System Monitor 4.0.1.5 FSM Event Integration Whitepaper SC19-3116-00 Before using this information and the product it supports, read the information in Notices at the end of this document.
IBM TRIRIGA Anywhere Version 10 Release 4. Installing a development environment
IBM TRIRIGA Anywhere Version 10 Release 4 Installing a development environment Note Before using this information and the product it supports, read the information in Notices on page 9. This edition applies
Implementing the End User Experience Monitoring Solution
IBM Tivoli Application Performance Management Implementing the End User Experience Monitoring Solution John Griffith Copyright International Business Machines Corporation 2012. US Government Users Restricted
Storage System High-Availability & Disaster Recovery Overview [638]
Storage System High-Availability & Disaster Recovery Overview [638] John Wolfgang Enterprise Storage Architecture & Services [email protected] 26 June 2014 Agenda Background Application-Based
Linux. Managing security compliance
Linux Managing security compliance Linux Managing security compliance Note Before using this information and the product it supports, read the information in Notices on page 7. First Edition (December
IBM WebSphere Data Interchange V3.3
IBM Software Group IBM WebSphere Data Interchange V3.3 This presentation will present an overview of the WebSphere Data Interchange product. IBM Software Group Page 1 of 14 Agenda IBM Software Group Electronic
IBM Network Advisor IBM Redbooks Product Guide
IBM Network Advisor IBM Redbooks Product Guide This IBM Redbooks Product Guide describes IBM Network Advisor Version 12.4. Although every network type has unique management requirements, most organizations
Continuous access to Read on Standby databases using Virtual IP addresses
Continuous access to Read on Standby databases using Virtual IP addresses January 2011 Table of contents 1 Executive summary...1 1.1 HADR system configuration...1 1.2 System pre-requisites...1 2 Setup
Broadcom NetXtreme Gigabit Ethernet Adapters IBM Redbooks Product Guide
Broadcom NetXtreme Gigabit Ethernet Adapters IBM Redbooks Product Guide The Broadcom NetXtreme Gigabit Ethernet Adapters are a family of high performance PCI Express adapters. With five adapters to choose
Content Manager OnDemand Backup, Recovery, and High Availability
Front cover Content Manager OnDemand Backup, Recovery, and High Availability Introducing basic concepts, strategies, options, and procedures Covering multiplatforms, iseries, and z/os Including real world
Reading multi-temperature data with Cúram SPMP Analytics
IBM Cúram Social Program Management Reading multi-temperature data with Cúram SPMP Analytics Anthony Farrell is a senior software engineer in the IBM Cúram platform group. Anthony has technical responsibility
ServeRAID M5000 Series Performance Accelerator Key for IBM System x IBM System x at-a-glance guide
:: Seite 1 von 13 :: Datenblatt zum Produkt IBM ServeRAID M5000 Series Performance Accel mit DC# 601672 :: ServeRAID M5000 Series Performance Accelerator Key for IBM System x IBM System x at-a-glance guide
IBM Client Security Solutions. Password Manager Version 1.4 User s Guide
IBM Client Security Solutions Password Manager Version 1.4 User s Guide IBM Client Security Solutions Password Manager Version 1.4 User s Guide First Edition (October 2004) Copyright International Business
IBM XIV Management Tools Version 4.7. Release Notes IBM
IBM XIV Management Tools Version 4.7 Release Notes IBM First Edition (September 2015) This edition applies to IBM XIV Management Tools version 4.7 release, and to all subsequent releases and modifications
z/os Data Replication as a Driver for Business Continuity
z/os Data Replication as a Driver for Business Continuity Karen Durward IBM August 9, 2011 Session Number 9665 Important Disclaimer Copyright IBM Corporation 2011. All rights reserved. U.S. Government
Redpaper. Tivoli Storage Manager for Virtual Environments - Data Protection for VMware Deployment Guide. Front cover. ibm.
Front cover Tivoli Storage Manager for Virtual Environments - Data Protection for VMware Deployment Guide Describes Data Protection for VMware 6.4 new features Provides detailed planning, installation,
IBM Software Group. SW5706 JVM Tools. 2007 IBM Corporation 4.0. This presentation will act as an introduction to JVM tools.
SW5706 JVM Tools This presentation will act as an introduction to. 4.0 Page 1 of 15 for tuning and problem detection After completing this topic, you should be able to: Describe the main tools used for
Solutions for BC/DR. (as seen trough Storage) IBM System Storage TM. Klemen Bačak [email protected]. 7.11.2007, Banja Luka
IBM System Storage TM Solutions for BC/DR (as seen trough Storage) Klemen Bačak [email protected] 7.11., Banja Luka IBM Corporation Agenda. 09:30-10:00 Registracija 10:00-10:05 Otvaranje i dobrodošlica
IBM TotalStorage IBM TotalStorage Virtual Tape Server
IBM TotalStorage IBM TotalStorage Virtual Tape Server A powerful tape storage system that helps address the demanding storage requirements of e-business storag Storage for Improved How can you strategically
ServeRAID H1110 SAS/SATA Controller for IBM System x IBM System x at-a-glance guide
ServeRAID H1110 SAS/SATA Controller for IBM System x IBM System x at-a-glance guide The ServeRAID H1110 SAS/SATA Controller for IBM System x offers a low-cost enterprise-grade RAID solution for internal
Redpaper. Lotus Domino Domain Monitoring. Front cover. ibm.com/redbooks. Introduction to the powerful new Domino 7 features
Front cover Lotus Domino Domain Monitoring Introduction to the powerful new Domino 7 features Probes, corrective actions, and collection hierarchies Examples of monitoring scenarios with tips and techniques
Effective Storage Management for Cloud Computing
IBM Software April 2010 Effective Management for Cloud Computing April 2010 smarter storage management Page 1 Page 2 EFFECTIVE STORAGE MANAGEMENT FOR CLOUD COMPUTING Contents: Introduction 3 Cloud Configurations
