Cloud-integrated Storage What & Why



Similar documents
Cloud-integrated Enterprise Storage. Cloud-integrated Storage What & Why. Marc Farley

Data Protection. the data. short retention. event of a disaster. - Different mechanisms, products for backup and restore based on retention and age of

Big data Devices Apps

Cloud OS Vision. Modern platform for the world s apps

HYBRID CLOUD STORAGE FROM MICROSOFT: LEVERAGING WINDOWS AZURE AND STORSIMPLE

Solution brief: Modernized data protection with Veeam and HP Storage

How to Manage Critical Data Stored in Microsoft Exchange Server By Hitachi Data Systems

UNDERSTANDING DATA DEDUPLICATION. Thomas Rivera SEPATON

Dell PowerVault DL2200 & BE 2010 Power Suite. Owen Que. Channel Systems Consultant Dell

StorSimple + Microsoft Azure = Hybrid Cloud Storage. Learn more. StorSimple. Data Storage Reimagined

Hybrid Cloud Storage with StorSimple

TECHNICAL PAPER. Veeam Backup & Replication with Nimble Storage

UNDERSTANDING DATA DEDUPLICATION. Tom Sas Hewlett-Packard

VMware vsphere Data Protection 6.0

IBM Tivoli Storage Manager for Virtual Environments

ADVANCED DEDUPLICATION CONCEPTS. Larry Freeman, NetApp Inc Tom Pearce, Four-Colour IT Solutions

We look beyond IT. Cloud Offerings

Our Cloud Backup Solution Provides Comprehensive Virtual Machine Data Protection Including Replication

Appliance Family. Cloud-Integrated Enterprise Storage. creating a large disparity between traditional storage and cloud storage.

VMware VDR and Cloud Storage: A Winning Backup/DR Combination

SOLUTION BRIEF KEY CONSIDERATIONS FOR BACKUP AND RECOVERY

Re-Invent Your Recovery

SQL Server Storage Best Practice Discussion Dell EqualLogic

Protecting Microsoft Hyper-V 3.0 Environments with CA ARCserve

Backup and Recovery 1

UNDERSTANDING DATA DEDUPLICATION. Jiří Král, ředitel pro technický rozvoj STORYFLEX a.s.

Storage and High Availability with Windows Server 10971B; 4 Days, Instructor-led

VMware vsphere Data Protection 5.8 TECHNICAL OVERVIEW REVISED AUGUST 2014

Complete Storage and Data Protection Architecture for VMware vsphere

Restoration Technologies. Mike Fishman / EMC Corp.

Hybrid Cloud Storage. Sævar Haukdal sölustjóri skýjalausna

Software Defined Microsoft. PRESENTATION TITLE GOES HERE Siddhartha Roy Cloud + Enterprise Division Microsoft Corporation

THE SUMMARY. ARKSERIES - pg. 3. ULTRASERIES - pg. 5. EXTREMESERIES - pg. 9

Remote/Branch Office IT Consolidation with Lenovo S2200 SAN and Microsoft Hyper-V

Maximize Your Virtual Environment Investment with EMC Avamar. Rob Emsley Senior Director, Product Marketing

Protect Data... in the Cloud

Pricing - overview of available configurations

Access to easy-to-use tools that reduce management time with Arcserve Backup

Redefining Microsoft SQL Server Data Management. PAS Specification

EMC AVAMAR. a reason for Cloud. Deduplication backup software Replication for Disaster Recovery

How To Get A Storage And Data Protection Solution For Virtualization

StoneFly SCVM TM for ESXi

Using Data Domain Storage with Symantec Enterprise Vault 8. White Paper. Michael McLaughlin Data Domain Technical Marketing

IBM TSM DISASTER RECOVERY BEST PRACTICES WITH EMC DATA DOMAIN DEDUPLICATION STORAGE

Unitrends Recovery-Series: Addressing Enterprise-Class Data Protection

June Blade.org 2009 ALL RIGHTS RESERVED

Veeam Backup and Replication Architecture and Deployment. Nelson Simao Systems Engineer

Protecting Citrix XenServer Environments with CA ARCserve

10971B: Storage and High Availability with Windows Server

Asigra Cloud Backup V13.0 Provides Comprehensive Virtual Machine Data Protection Including Replication

Westek Technology Snapshot and HA iscsi Replication Suite

StorSimple Solution for File Share Deployments

Backup Exec 2010 Deduplication Protect More, Store Less, Save More

Optimizing Backup and Data Protection in Virtualized Environments. January 2009

Course 10971:Storage and High Availability with Windows Server

efficient protection, and impact-less!!

next generation architecture created to safeguard in virtual & physical environments to deliver comprehensive UNIFIED DATA PROTECTION SOLUTION BRIEF

Veeam Backup & Replication Enterprise Plus Powered by Cisco UCS: Reliable Data Protection Designed for Virtualized Environments

HP Integration with Veeam Backup and Replication. Mark Hambelton Veeam EMEA Alliances SE

A STORAGE SYSTEM JUST LIKE THE ONE YOU HAVE TODAY A STORAGE SYSTEM NOTHING LIKE THE ONE YOU HAVE TODAY.

Deep Dive on SimpliVity s OmniStack A Technical Whitepaper

Vodacom Managed Hosted Backups

Backup and Recovery Solutions for Exadata. Cor Beumer Storage Sales Specialist Oracle Nederland

Asigra Cloud Backup V13 Delivers Enhanced Protection for Your Critical Enterprise Data

Storage and High Availability with Windows Server

Microsoft Private Cloud Fast Track

NETGEAR SMB Storage Line Update and ReadyNAS 2100 Introduction

Redefining Backup for VMware Environment. Copyright 2009 EMC Corporation. All rights reserved.

Backup and Recovery Solutions for Exadata. Ľubomír Vaňo Principal Sales Consultant

Backup Solution Testing on UCS for Small-Medium Range Customers (Disk to Tape) Acronis Advanced Backup Software

Redefining Microsoft Exchange Data Management

High Performance Server SAN using Micron M500DC SSDs and Sanbolic Software

ANDREW HERTENSTEIN Manager Microsoft Modern Datacenter and Azure Solutions En Pointe Technologies Phone

Symantec NetBackup 7.5 for VMware

Making a Smooth Transition to a Hybrid Cloud with Microsoft Cloud OS

Leveraging Virtualization for Disaster Recovery in Your Growing Business

Native Data Protection with SimpliVity. Solution Brief

IBM Tivoli Storage Manager

VMware vsphere Data Protection 6.1

Long term retention and archiving the challenges and the solution

White. Paper. Microsoft Azure StorSimple: The Next Step for Hybrid Storage. July 2014

Kaminario K2 All-Flash Array

Backup and Recovery Redesign with Deduplication

Asigra Cloud Backup V13.0 Gives You Greater Flexibility and Expands Your Total Addressable Market

CA arcserve Unified Data Protection virtualization solution Brief

Reduce your data storage footprint and tame the information explosion

IBM Tivoli Storage FlashCopy Manager

Quantum DXi6500 Family of Network-Attached Disk Backup Appliances with Deduplication

DEDUPLICATION BASICS

IBM Spectrum Protect in the Cloud

Leveraging Public Cloud for Affordable VMware Disaster Recovery & Business Continuity

Business Benefits of Data Footprint Reduction

EVault Technology Build Cloud-Connected Backup and Recovery Services for Datacenter

Turnkey Deduplication Solution for the Enterprise

Realizing the Benefits of Hybrid Cloud. Anand MS Cloud Solutions Architect Microsoft Asia Pacific

Dell Data Protection Point of View: Recover Everything. Every time. On time.

Transcription:

Cloud-integrated Storage What & Why

Table of Contents Overview...3 CiS architecture...3 Enterprise-class storage platform...4 Enterprise tier 2 SAN storage...4 Activity-based storage tiering and data ranking...5 Data reduction and thin provisioning...6 Integrated cloud data management...6 Cloud snapshots...6 Cloud data reduction...6 Cloud storage WAN optimization...6 Cloud as a Tier...7 Cloud thin provisioning...7 Cloud clones...7 Cloud thin restore...8 Location-independent recovery...9 The Big Picture...9 Summary...10 2

Overview This paper is an overview of a new class of storage technology called cloud-integrated storage, or CiS. CiS combines a number of storage technologies, including iscsi SAN, snapshot, backup, deduplication and compression with storage services offered by cloud service providers. The CiS architecture brings new management capabilities that organizations may want to consider for their own IT implementations. Figure 1 below illustrates the basic topology of CiS. Figure 1: Basic topology of CiS CiS Architecture CiS products are built from three fundamental components (see Figure 2) SAN storage Cloud data management Enterprise-class storage platform Figure 2: Components of CiS 3

Enterprise-class Storage Platform Enterprise ready, highly-available storage is protected from a single point of failure with redundant protection for all components, including dual controllers, battery-backed memory, multiple ports and RAID. In addition, hot swappable components and nondisruptive software upgrades mean hardware and software can be upgraded without downtime. Operating system and platform certifications from Microsoft Windows Server 2008 and VMware are integral parts of what constitutes an enterprise storage platform today. In addition, StorSimple has been extensively tested and deployed with cloud storage providers such as Windows Azure. Application-consistent snapshots are integrated with CiS systems and use an application s storage APIs to temporarily quiesce operations and get clean point-intime versions of data. That means data can be quickly and accurately restored without errors or administrators spending additional time resolving data inconsistencies. Enterprise Tier 2 SAN Storage CiS uses the industry-standard iscsi SAN protocol to connect to servers. iscsi is easily configured for use with both Microsoft and VMware servers and is widely understood by storage administrators. CiS is intended to run as primary storage for enterprise tier 2 applications, including email, file shares, Microsoft Sharepoint, content management systems, virtual machines/ VM sprawl and large unstructured data repositories. It is not built for latency-sensitive applications such as online transaction processing. A good way to visualize tier 2 data is that is follows a lifecycle curve similar to that shown in Figure 3 where data is accessed most heavily in the days immediately after it is created and then less frequently thereafter. 4

Figure 3 Data Lifecycles. source: Oracle Corporation Activity-based storage tiering and data ranking CiS systems use three different types of storage: performance-oriented flash SSDs, capacity-oriented SAS disk drives and cloud storage. Data is moved from one type of storage to another according to its relative activity level and customer-chosen policies. Data that becomes more active is moved to a faster type of storage and data that becomes less active is moved to a higher capacity type of storage. There are four logical tiers in the system, two at the SSD level and one each in the SAS and cloud storage levels. The four tiers are shown below in Table 1. The third column in Table 1, data activity, indicates the relative activity level for the various tiers. The native and hot tiers have the most active data, with the distinction being that data in the native tier has been recently added to the CiS system and data in the hot tier was has been in the system longer. The cool tier has the least active data and the warm tier has data that is neither the most or least active. Table 1: Logical tiers in a StorSimple CiS system 5

Data ranking is an automated process that combines the activity level of data with its age and applicable policies to determine what tier data is placed on. Data reduction and thin provisioning The fourth column in Table 1 indicates the type of data reduction technology used in the various tiers. The native tier has none, the hot tier uses deduplication (or dedupe) and the warm and cool tiers use full reduction, which means data is compressed as well as deduped. Notice that the progression from native to warm tiers implies that data is first deduped before it is compressed. Dedupe reduces the amount of data stored in the system by identifying data duplicates and removing excess copies. Dedupe is particularly effective in virtual server environments. Compression reduces the amount of data stored in the system by identifying strings of repeated data values and replacing them with encoded shorthand Another capacity-conserving technology in CiS systems is thin provisioning, which allocates storage capacity as it is needed, as opposed to reserving capacity in advance. All storage in a CiS system is thinly provisioned. Cloud Data Management CiS provides a broad set of data management tools that enable customers to use cloud storage in ways that are familiar to them, including archive and backup storage. Many of the data management tools in CiS systems are automated to reduce the workload on administrators. Cloud snapshots are point-in-time copies of data that are stored on cool tiers in the cloud. All cloud snapshots are fully reduced (deduped and compressed) to minimize the amount of storage consumed. Cloud data reduction and cloud storage WAN optimization refers to the fact that data transferred and stored in the cloud by a CiS system has already been fully reduced. This minimizes the cost of cloud storage as well as the transaction costs and WAN bandwidth associated with storing data in the cloud. 6

Cloud as a Tier (CaaT) refers to the automated use of cloud storage as the cool tier in a CiS system. Data that is ranked lowest is sent to a cool tier in the cloud where it remains until it is accessed again and promoted back to the warm tier. This map is typically.1% the size of the stored data. AES-256 encryption is applied to all data transmitted and stored in the cloud by CiS systems to ensure its security. Cloud thin provisioning is thin provisioning applied to the cloud storage used by a CiS system. Cloud thin provisioning allocates cloud storage automatically as it is needed instead of reserving cloud capacity in advance, ensuring CiS customers do not pay more for storage than necessary. CiS systems provide volume-level cloud mapping between storage volumes on CiS systems and the location in the cloud or clouds. Different volumes can have cool tiers on the same or different cloud services. Every CiS system keeps a metadata map that describes the state of the system and provides an image of the volume s contents at the time a snapshot is taken. SHA-256 hashing is applied to all data transmitted and stored in the cloud as a means to guarantee data integrity. Cloud clones are the equivalent of a synthetic full backup that have all the current data for a volume at the time of the last snapshot. They are stored in the cool tier for use in disaster recovery scenarios, but they occupy separate repositories from cloud snapshots and can reside within the same or a different cloud service as the volume s cloud snapshots. Figure 4 shows that cloud clones are located in different repositories from cloud snapshots and that they can use the same or a different cloud service. Figure 4: Location of cloud snapshots and cloud clones 7

restore cool data that does not belong to any working sets. Figure 5: The thin restore process Figure 6 below contrasts RTOs for three different backup scenarios. The top line in red represents cloud storage used for virtual tape. The problem with this approach is that all the data has to be restored back through the WAN where network performance is virtually prohibitive. The middle line in black is traditional tape stored in an off-site facility where the gating factor is the time it takes to retrieve A thin restore is a disaster recovery process where a CiS system downloads data from the cloud. The first thing downloaded is the metadata map and then users and applications can start accessing their working sets and download them. As data is downloaded it is ranked and placed in either the appropriate tier. The thin restore process is shown in Figure 5. Thin restores tend to have extremely short RTOs (Recovery Time Objectives); because systems can begin accessing data after the metadata map is downloaded. Thin restores do not Figure 6: Comparison of RTOs for cloud-based virtual tape, traditional tape and CiS 8

all the tapes needed from an off-site vault. The green line on the bottom is CiS cloud snapshots or clones and where applications and users can be accessing after downloading a relatively small amount of data. in any of those locations to recover from disasters in any of the other sites. Similarly, a single CiS system can act as a spare for any of the others, providing an extremely costeffective DR implementation. Location-independent recovery refers to the ability to perform thin restores from any location with a suitable Internet connection. This differs from legacy disaster recovery operations that are restricted to running at specific recovery sites. Location independence adds an additional level of redundancy to the recovery process and does not require the capital investment that traditional replication solutions do. A customer with multiple data center locations can use CiS systems running The Big Picture Figure 8 below shows a composite of all the various elements in CiS systems and its three major pillars: enterprise SAN storage, cloud data management and a highly-available enterprise-class platform. Figure 8: The big picture of cloud-integrated enterprise storage 9

Summary CiS is a new type of storage system that integrates SAN storage and cloud data management on a highly-available platform. CiS was developed to meet the requirements of enterprise tier 2 applications where there is a relatively small working set requiring SAN performance and a relatively large amount of data that is dormant, or cool, that is not accessed often, if ever. A rich set of storage management features automate some of the most time-consuming manual processes in traditional storage environments. CiS systems streamline data protection processes such as backup and DR, significantly reducing the cost and time involved with both. Contact StorSimple 2350 Mission College Boulevard, Suite 1250, Santa Clara, CA 95054 Tel: (408)-550-2300 Web: www.storsimple.com 2012 StorSimple, Inc. 10 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS SUMMARY. Document published March 2013