Trends in Data Protection and Restoration Technologies. Mike Fishman, EMC 2 Corporation (Author and Presenter)



Similar documents
Restoration Technologies. Mike Fishman / EMC Corp.

Trends in Data Protection and Restoration Technologies. Jason Iehl, NetApp

Backup to Tape, Disk and Beyond. Jason Iehl, NetApp

Introduction to Data Protection: Backup to Tape, Disk and Beyond. Michael Fishman, EMC Corporation

Introduction to Data Protection: Backup to Tape, Disk and Beyond. Michael Fishman, EMC Corporation

Introduction to Data Protection: Backup to Tape, Disk and Beyond

UNDERSTANDING DATA DEDUPLICATION. Thomas Rivera SEPATON

Trends in Application Recovery. Andreas Schwegmann, HP

UNDERSTANDING DATA DEDUPLICATION. Jiří Král, ředitel pro technický rozvoj STORYFLEX a.s.

UNDERSTANDING DATA DEDUPLICATION. Tom Sas Hewlett-Packard

ADVANCED DEDUPLICATION CONCEPTS. Larry Freeman, NetApp Inc Tom Pearce, Four-Colour IT Solutions

15 Best Practices For Comparing Data Protection With Cloud Media Server

Deduplication s Role in Disaster Recovery. Thomas Rivera, SEPATON

Deduplication s Role in Disaster Recovery. Gene Nagle, EXAR Thomas Rivera, SEPATON

Creating a Catalog for ILM Services. Bob Mister Rogers, Application Matrix Paul Field, Independent Consultant Terry Yoshii, Intel

How To Protect Data On Network Attached Storage (Nas) From Disaster

Protect Microsoft Exchange databases, achieve long-term data retention

Deduplication s Role in Disaster Recovery. Thomas Rivera, SEPATON

SERVER VIRTUALIZATION AND STORAGE DISASTER RECOVERY. Ray Lucchesi, Silverton Consulting

Redefining Oracle Database Management

NetApp Replication-based Backup

Improving Microsoft SQL Server Recovery with EMC NetWorker and EMC RecoverPoint

EMC Disk Library with EMC Data Domain Deployment Scenario

PROTECTING DATA IN THE BIG DATA WORLD. Thomas Rivera, Hitachi Data Systems

Protecting enterprise servers with StoreOnce and CommVault Simpana

Using HP StoreOnce Backup Systems for NDMP backups with Symantec NetBackup

Business-Centric Storage FUJITSU Storage ETERNUS CS800 Data Protection Appliance

DEFINING THE RIGH DATA PROTECTION STRATEGY

Cloud Archiving. Paul Field Consultant

Redefining Microsoft SQL Server Data Management. PAS Specification

Cost Effective Backup with Deduplication. Copyright 2009 EMC Corporation. All rights reserved.

How to Manage Critical Data Stored in Microsoft Exchange Server By Hitachi Data Systems

Server and Storage Virtualization with IP Storage. David Dale, NetApp

in Transition to the Cloud

Business-centric Storage FUJITSU Storage ETERNUS CS800 Data Protection Appliance

Windows Server 2008 Hyper-V Backup and Replication on EMC CLARiiON Storage. Applied Technology

VMware VDR and Cloud Storage: A Winning Backup/DR Combination

Using HP StoreOnce Backup systems for Oracle database backups

June Blade.org 2009 ALL RIGHTS RESERVED

How to Cost Effectively Retain Reference Data for Analytics and Big Data. Molly Rector, EVP Product Management & WW Marketing, Spectra Logic

Redefining Microsoft SQL Server Data Management

Near-Instant Oracle Cloning with Syncsort AdvancedClient Technologies White Paper

WHITE PAPER Overview of Data Replication

VMware vsphere Data Protection 6.0

Redefining Microsoft Exchange Data Management

Today s Agile, Complex and Heterogeneous Data Centers

SQL SERVER ADVANCED PROTECTION AND FAST RECOVERY WITH DELL EQUALLOGIC AUTO SNAPSHOT MANAGER

Protecting Microsoft Hyper-V 3.0 Environments with CA ARCserve

VDI Optimization Real World Learnings. Russ Fellows, Evaluator Group

Symantec Backup Exec 2014 Agents and Options

Storage Backup and Disaster Recovery: Using New Technology to Develop Best Practices

Backup and Recovery Solutions for Exadata. Cor Beumer Storage Sales Specialist Oracle Nederland

SOLUTION BRIEF KEY CONSIDERATIONS FOR BACKUP AND RECOVERY

CommVault Simpana Remote and Branch Office Protection

Efficient Backup with Data Deduplication Which Strategy is Right for You?

Backup and Recovery Solutions for Exadata. Ľubomír Vaňo Principal Sales Consultant

Backup and Recovery 1

EMC PERSPECTIVE. An EMC Perspective on Data De-Duplication for Backup

ILM: Tiered Services & The Need For Classification

BUSINESS CONTINUITY AND DISASTER RECOVERY FOR ORACLE 11g

Dell PowerVault DL2200 & BE 2010 Power Suite. Owen Que. Channel Systems Consultant Dell

Active Archive - Data Protection for the Modern Data Center. Molly Rector, Spectra Logic Dr. Rainer Pollak, DataGlobal

IP Storage On-The-Road Seminar Series

VMware vsphere Data Protection 5.8 TECHNICAL OVERVIEW REVISED AUGUST 2014

Technology Insight Series

WHITE PAPER: DATA PROTECTION. Veritas NetBackup for Microsoft Exchange Server Solution Guide. Bill Roth January 2008

How To Migrate To A Network (Wan) From A Server To A Server (Wlan)

CA ARCserve Family r15

Reduced Complexity with Next- Generation Deduplication Innovation

Energy Efficient Storage - Multi- Tier Strategies For Retaining Data

Backup Exec 15 Agents and Options

Backup and Archiving Explained. White Paper

White. Paper. Addressing NAS Backup and Recovery Challenges. February 2012

EMC NETWORKER SNAPSHOT MANAGEMENT

Data Protection. the data. short retention. event of a disaster. - Different mechanisms, products for backup and restore based on retention and age of

EMC NETWORKER AND DATADOMAIN

The Business Value of Data Deduplication DDSR SIG

Business Process Desktop: Acronis backup & Recovery 11.5 Deployment Guide

Business Benefits of Data Footprint Reduction

Cloud-integrated Storage What & Why

Module: Business Continuity

Why Your Backup/Recovery Solution Probably Isn t Good Enough

ETERNUS CS High End Unified Data Protection

Understanding EMC Avamar with EMC Data Protection Advisor

HP Data Protector software Zero Downtime Backup and Instant Recovery. Data sheet

Optimizing IT Data Services

Cloud File Services: October 1, 2014

EMC DATA DOMAIN PRODUCT OvERvIEW

Virtual Storage Management for the Enterprise

This presentation contains some information about future Veeam product releases, the timing and content of which are subject to change without

TECHNICAL PAPER. Veeam Backup & Replication with Nimble Storage


SQL SERVER ADVANCED PROTECTION AND FAST RECOVERY WITH EQUALLOGIC AUTO-SNAPSHOT MANAGER

Cloud OS Vision. Modern platform for the world s apps

Using HP StoreOnce D2D systems for Microsoft SQL Server backups

Rethinking Archiving: Exploring the path to improved IT efficiency and maximizing value of archiving solution investments

Business Life Insurance

Complete Storage and Data Protection Architecture for VMware vsphere

EMC RECOVERPOINT: BUSINESS CONTINUITY FOR SAP ENVIRONMENTS ACROSS DISTANCE

Protect Data... in the Cloud

Transcription:

Trends in Data Protection and Restoration Technologies Mike Fishman, EMC 2 Corporation (Author and Presenter)

SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless otherwise noted. Member companies and individual members may use this material in presentations and literature under the following conditions: Any slide or slides used must be reproduced in their entirety without modification The SNIA must be acknowledged as the source of any material used in the body of any document containing material from these presentations. This presentation is a project of the SNIA Education Committee. Neither the author nor the presenter is an attorney and nothing in this presentation is intended to be, or should be construed as legal advice or an opinion of counsel. If you need legal advice or a legal opinion please contact your attorney. The information presented herein represents the author's personal opinion and current understanding of the relevant issues involved. The author, the presenter, and the SNIA do not assume any responsibility or liability for damages arising out of any reliance on or use of this information. NO WARRANTIES, EXPRESS OR IMPLIED. USE AT YOUR OWN RISK. 2

Abstract Many disk technologies, both old and new, are being used to augment tried and true backup and data protection methodologies to deliver better information and application restoration performance. These technologies work in parallel with the existing backup paradigm, This session will discuss many of these technologies in detail. Important considerations of data protection include performance, scale, regulatory compliance, recovery objectives and cost. Technologies include contemporary backup, disk based backups, snapshots, continuous data protection and capacity optimized storage. Detail of how these technologies interoperate will be provided as well as best practices recommendations for deployment in today's heterogeneous data centers. Understand legacy and contemporary storage technologies that provide advanced data protection Compare and contrast advanced data protection alternatives Gain insights into emerging DP technologies. 3

Protection Based on Recovery Years Days Hrs Mins Secs Secs Mins Hrs Days Recovery Point Recovery Time Protection Methods Recovery Methods Tape Backups Capture on Write Vaults Cloud Archival Disk Backups Snapshots Synthetic Backup Real Time Replication VTL Instant Recovery Disk Restores Tape Restores Point-in-Time Roll Back Search & Retrieve Enabling Technologies Tape & Automation Virtual Tape Library Deduplication Continuous Data Protection Snapshots Backup to Disk 4

Application Consistency What? When an application is running during the copy process Various techniques are available to ensure data consistency Why? Much like the open files issue when backing up a file system that is in use, applications (like databases, messaging systems, etc) allow for different approaches to capturing a holistic picture of the applications data during a copy process (such as a snapshot, a mirror-split, or CDP protection). Considerations It is important to understand the consistency semantics of your application so that your data protection copies are recoverable 5

Consistency - Offline Backup Shutdown the application / database Guarantees application consistency All cache data copied to disk All transactions closed Optional: database consistency check Backup to another disk / tape OR create a snapshot Optional: move / delete the transaction logs Frees disk space Enables incremental backup based on transaction logs Start the application Optional: backup the snapshot to another device or location Recycle the snapshot Keep the last # snapshots Snapshot rotation 6

Crash Consistent Create a snapshot while the application runs Application consistency has the same quality as after a system crash Most applications / databases can survive system crashes But some don t and some not always. Recovery cannot be guaranteed Note: Some applications may force a database consistency check Use cases 7 x 24 operations -> no backup window Virtual Machine backup without agent or service API Application lacks online backup mode feature No resources for transaction logging during backup Snapshots enable more points in time Combine with Consistent backups 7

Consistency - Online Database(s) are in backup mode during backup Data files don t change while in backup mode Changes during backup happen in the cache and go into logs After backup all changes are applied to the data files Optional: backup of the transaction logs & delete logs afterwards Optional: ongoing log file backup after database backup -> CDP Consistent search index All databases need to go into the backup mode Must ensure consistency across all nodes Use cases 7 x 24 operations -> no backup window Guaranteed & fully supported consistent recovery 8

Data Protection & Data Management Data Protection Disk-Assisted and Disk-based protection methods Array and storage network based data protection Object based Archival Snapshots and replication Tape based data protection Backup to Virtual Tape Backup to Disk Backup of Virtual Machines Data Management Information classification Information valuation ($$$) Information lifecycle management Tiered Storage Primary Secondary Archive Backup Cloud 9

Snapshots What? A disk based instant copy that captures the original data at a specific point in time. Snapshots can be read-only or read-write. Also known as Checkpoint, Point-in-Time, Stable Image, Clone Any technology that presents a consistent point-in-time view Why? Allows for complete backup or restore With application downtime measured in minutes (or less) Most vendors: Image only = (entire Volume) Backup/Restore of individual files is possible If conventional backup is done from snapshot Or, if file-map is stored with Image backup 10

Snapshot Considerations Full Copy Snapshot Differential Copy Snapshot Upsides Minimal performance impact Independent copy available for DR Less storage consumption Often takes advantage of cheaper disk Downsides High disk utilization No GEO-redundant protection Performance may be impacted Dependent on primary copy Applications Disaster Recovery Near zero backup window Fastest restore Valuable for data repurposing Backup source Near zero backup window Fast restore Can help with data repurposing Beware performance impact 11

Snapshot Considerations Snaps of production storage may impact production Consider performance, storage, virtual-machine impacts Snap recovery tools may not be as mature Retention policy impact Number of copies retained Recovery granularity Meeting off-site protection via distance replication On-array versus off-array alternatives Cost trade-offs and information classification Can you combine snapshots with replication 12

Backup to Disk (B2D) What Why? Replace tape targets with disks Perform snapshot-based backups Recover from data on-line versus on-truck Leverage disk reliability and performance Simplify backup process, reduce device sharing Improved security What to watch out for Bottlenecks may NOT be the backup target Potential for added complexity and training Advanced features may increase SW costs Backup window issues may still exist Meeting offsite or off-line backup requirements LAN SAN Disk Target Tape Library 13

Virtual Tape Library (VTL) What? Virtual Tape Libraries emulate traditional tape Easy to deploy and integrate Reduce / eliminate tape handling Backup Server VTL Why? Improved performance and reliability Reduced complexity IP / FC SAN Unlimited tape drives reduce device sharing, improve backup times Enables technologies such as remote replication, deduplication Tape Library Considerations Avoids mechanical and performance limitations of tape Integration with physical tape Consider total aggregate speed as well as speed per-drive 14

VTL Best Practices Use as primary backup target to reduce backup window Add storage to enable additional recovery time objectives Follow physical tape configuration and sharing rules Match virtual drives per connection Don t mix tape and disk on same ports Use the right OS driver Tape redeployment Backend tape creation Cloning or vaulting or tape copies leveraging the backup server VTL directly creates tapes Offsite requirements Bandwidth, connectivity, time to complete tape copies 15

Data Deduplication What? Why? The process of examining a data-set or I/O stream at the sub-file level and storing and/or sending only unique data Client-side SW, Target-side HW or SW, can be both client and target Reduction in cost per terabyte stored Significant reduction in storage footprint Less network bandwidth required Considerations Greater amount of data stored in less physical space Suitable for backup, archive and (maybe) primary storage Enables lower cost replication for offsite copies Store more data for longer periods Beware 1000:1 dedupe claims Know your data and use case Trade-offs (Performance, Encryption, Compression) Check out SNIA Tutorial: Advanced Deduplication Concepts 16

Factors Impacting Space Savings More Effective Deduplication Data created by users Low change rates Reference data and inactive data Applications with lower data transfer rates Use of full backups Longer retention of deduplicated data Continuous business process improvement Format awareness Temporal data deduplication Less Effective Deduplication Data captured from mother nature High change rates Active data, encrypted data, compressed data Applications with higher data transfer rates Use of incremental backups Shorter retention of deduplicated data Business as usual operational procedures No format awareness Spatial data deduplication Don t forget about compression 17

Backup of Virtual Machines What? How? Backup virtual machines and hypervisors Avoid resource contention (ie. Impact of backing up 20 VM s) Address backup storage growth Consider your recovery goals and objectives Deliver granularity of client backup and restore Improve operations by reducing backup and restore times Eliminate redundant data Reduce complexity Considerations VM Clones are not backups Native backup tools Integration with hypervisor Capacity, performance, scale 18

Virtual Machine Backups Best Practices Consider hypervisor-based backup tools for simple environments Isolate data files that don t need backups (temporary and transient data) Larger configurations may require more advanced tools Insist on integration with hypervisor tools and API s Backup the hypervisor AND then backup the virtual hosts Deduplicate your backups Consider snaps, clones and copies 19

Continuous Data Protection What? Why? Capture every change as it occurs Data can be collected and stored externally Roll-back to any point in time Zero data loss, Zero backup window Granular recovery to any point in time Continuous protection Normal Path Capture Point App Server Backup Path How? Block-based changes saved at the block level File-based file level changes are logged & recoverable Application-based logging is not quite CDP Protect Storage Object Record of Updates 20

Contrasting CDP and Replication Replication is not CDP (Synchronous) Replica or mirror is a single PIT copy of the data Multiple replicas plus logs can create multiple points in time Snapshots are not CDP (Asynchronous) Data loss possible if crash or corruption happens between snaps Snapshots frequently to same system as primary Lack continuous index with embedded knowledge of relationship of data to files, folders, application and server Backups (even multiple backups) are not CDP: Schedule frequency Database logging can provide additional granularity but still not CDP 21

Traditional Recovery Last Known- Good Image APPLICATION DOWNTIME Application Restarted Modifications Since Last Image Analyze Restore* Recover Recovery Point Objective Drives Recovery Time Objective *10TB restore from backup ~= 4 hours from disk, 12.5 hours from tape Recovery from snapshots reduces restore but older point in time snap causes increase in recovery time 22

Recovery with CDP Last known good image APPLICATION DOWNTIME Application Restarted Analyze Recover Instant Restore Offers a Closer Recovery Point Trends in Data Protection - CDP and VTL 2007 Storage Networking Industry Association. All Rights 2012 Reserved. Storage Networking Industry Association. All Rights Reserved....and a Shorter Recovery Time 23

Backup Replication What Why Multiple copies of backup data Copy tape-to-tape, disk-to-tape, disk-to-disk Replication can be network based Off-site data protection Media consolidation Increased security Leverage the Cloud? Backup Target WAN Backup Target Considerations Network bandwidth - Leverage deduplication, network devices, fat pipes Recovery process and resources Leveraging the copies (data mining oportunities) Backup versus archival 24

Data protection summary Data growth requires us to plan for tomorrow Investigate data and information management technology Information value determines data protection levels Stop protecting employee home movies, last years news Not all data assets are created equal Architecture Applications are not all the same Understand your networks, hosts, applications PLAN ahead Avoid reactionary thinking Do your homework SNIA offers seminars, classes, workshops.. 25

For more on Data Protection. Check out the Hands-On Lab Rethinking Archiving Advanced Data Reduction Concepts 26

Q&A / Feedback Please send any questions or comments on this presentation to SNIA: tracktutorials@snia.org Many thanks to the following individuals for their contributions to this tutorial. - SNIA Education Committee SNIA Data Protection & Capacity Optimization Committee SNIA Tech Council Nancy Clay Rob Peglar Mike Fishman Jason Iehl SW Worth Data Protection and Capacity Optimization Committee: http://www.snia.org/dpco/ 27