Disaster Recovery: Weighing Data Replication Alternatives



Similar documents
Veritas Cluster Server from Symantec

Data Protection with IBM TotalStorage NAS and NSI Double- Take Data Replication Software

Veritas Cluster Server by Symantec

A SURVEY OF POPULAR CLUSTERING TECHNOLOGIES

Protecting Microsoft SQL Server

High Availability with Postgres Plus Advanced Server. An EnterpriseDB White Paper

SAN Management Software Magic Quadrant

Case Studies Using EMC Legato NetWorker for OpenVMS Backups

Real-time Protection for Hyper-V

2003 Enterprise Backup/Restore Magic Quadrant

VERITAS NetBackup 6.0 Enterprise Server INNOVATIVE DATA PROTECTION DATASHEET. Product Highlights

Eliminate SQL Server Downtime Even for maintenance

Server Vendors' High-Availability Services: Magic Quadrant

PROTECTING MICROSOFT SQL SERVER TM

Symantec Cluster Server powered by Veritas

Microsoft SharePoint 2010 on VMware Availability and Recovery Options. Microsoft SharePoint 2010 on VMware Availability and Recovery Options

Module 14: Scalability and High Availability

Contents. SnapComms Data Protection Recommendations

High Availability for Databases. Uwe Schulz SAP AG

Cisco Active Network Abstraction Gateway High Availability Solution

IBM TSM DISASTER RECOVERY BEST PRACTICES WITH EMC DATA DOMAIN DEDUPLICATION STORAGE

Tivoli Flashcopy Manager Update and Demonstration

Veritas Replicator from Symantec

High Availability Server Clustering Solutions

Understanding and Designing Serviceguard Disaster Tolerant Architectures Fifth Edition

Data Sheet: Disaster Recovery Veritas Volume Replicator by Symantec Data replication for disaster recovery

Increasing Recoverability of Critical Data with EMC Data Protection Advisor and Replication Analysis

Patch management point solution. Platform. Patch Management Point Solution

Symantec Disaster Recovery Advisor

HA / DR Jargon Buster High Availability / Disaster Recovery

Windows Server 2008 Hyper-V Backup and Replication on EMC CLARiiON Storage. Applied Technology

Disaster Recovery Solutions for Oracle Database Standard Edition RAC. A Dbvisit White Paper

Storage Based Replications

NetIQ Chariot and Application Scanner for Application Performance Management

Daniela Milanova Senior Sales Consultant

EMC Business Continuity for Microsoft SQL Server Enabled by SQL DB Mirroring Celerra Unified Storage Platforms Using iscsi

Disaster Recovery and Business Continuity Basics The difference between Disaster Recovery and Business Continuity

Veritas InfoScale Availability

Constant Replicator: An Introduction

Mirror File System for Cloud Computing

Integrated Application and Data Protection. NEC ExpressCluster White Paper

Disaster Recovery and Data Replication Architectures

SAN TECHNICAL - DETAILS/ SPECIFICATIONS

PROTECTING AND ENHANCING SQL SERVER WITH DOUBLE-TAKE AVAILABILITY

IBM Virtualization Engine TS7700 GRID Solutions for Business Continuity

VERITAS Backup Exec 10 for Windows Servers AGENTS & OPTIONS MEDIA SERVER OPTIONS KEY BENEFITS AGENT AND OPTION GROUPS

Using HP StoreOnce Backup systems for Oracle database backups

Veritas Storage Foundation High Availability for Windows by Symantec

Hitachi Data Systems Software

Continuous Data Replicator 7.0

MIMIX Availability. Version 7.1 MIMIX Operations 5250

Oracle Database Disaster Recovery Using Dell Storage Replication Solutions

RED HAT ENTERPRISE VIRTUALIZATION FOR SERVERS: COMPETITIVE FEATURES

OPTIONS / AGENTS DESCRIPTION BENEFITS

HP-UX File System Replication

HiRDB 9 HiRDB is an evolving database for continuing business services.

VERITAS NetBackup BusinesServer

Network-based Intelligent Data Protection Yossi Mossel, Product Manager

Compellent Source Book

VERITAS VERTEX Initiative

High Availability Databases based on Oracle 10g RAC on Linux

Virtual Server System and Data Protection, Recovery and Availability

High-Availablility Infrastructure Architecture Web Hosting Transition

Clustering in Parallels Virtuozzo-Based Systems

ABSTRACT. February, 2014 EMC WHITE PAPER

EMC Solutions for Disaster Recovery

Symantec NetBackup Clustered Master Server Administrator's Guide

Introduction to Enterprise Data Recovery. Rick Weaver Product Manager Recovery & Storage Management BMC Software

Symantec NetBackup Clustered Master Server Administrator's Guide

Caché High Availability Guide

OVERVIEW. CEP Cluster Server is Ideal For: First-time users who want to make applications highly available

SharePlex for Oracle How to replicate databases. Jeffrey Surretsky Solutions Architect

Using HP StoreOnce D2D systems for Microsoft SQL Server backups

Synchronous Data Replication

VERITAS Business Solutions. for DB2

recovery at a fraction of the cost of Oracle RAC

Deploying Global Clusters for Site Disaster Recovery via Symantec Storage Foundation on Infortrend Systems

The Progress Company Platform & Product Availability Guide Update: May 6, 2003

High Availability and Disaster Recovery for Exchange Servers Through a Mailbox Replication Approach

Protecting Citrix XenServer Environments with CA ARCserve

Server Clusters : Geographically Dispersed Clusters For Windows 2000 and Windows Server 2003

Veritas NetBackup 6.0 Server Now from Symantec

EMC Backup and Recovery for SAP Oracle with SAP BR*Tools Enabled by EMC Symmetrix DMX-3, EMC Replication Manager, EMC Disk Library, and EMC NetWorker

System Migrations Without Business Downtime. An Executive Overview

Maximum Availability Architecture

Running Successful Disaster Recovery Tests

Data Sheet: Data Protection Veritas NetBackup 6.5 NetBackup Enterprise Server- Next Generation Data Protection

Transcription:

Technology, D. Scott, J. Krischer, J. Rubin Research te 15 June 2001 Disaster Recovery: Weighing Data Replication Alternatives Enterprises with short disaster recovery time objectives use data replication technologies. We provide a framework for understanding the myriad of available options. Core Topics Software Infrastructure: Database Scalability and Availability for Transactional Systems; Disaster Recovery and Business Resumption Planning Key Issue How will technologies for business continuity and resumption evolve? Inextricable business process dependence on IT has increased economic vulnerabilities associated with downtime. longer can enterprises wait the traditional two, three or more days for recovery of critical applications in the event of a disaster. In fact, the most-critical applications, such as those used in e-commerce and customer service, often require either continuous availability (no interruption in service for any reason) or recovery in minutes to a few hours. In addition, many enterprises require no loss of transactions in the event of a disaster. Achieving short recovery times requires that enterprises build data replication architectures into their disaster recovery plans to replicate from a primary processing site to an alternate site, which can then be used in the event that the primary site becomes unavailable. Evaluating data replication technologies can be a daunting task, because of the large number of products on the market with differing implementation options and features. To add to this complexity, data replication solutions are specific to a database, file system, OS or disk subsystem; thus, enterprises often must use multiple solutions to protect their critical data as well as multiple methods to protect a single application environment. Solutions can be implemented at a secondary internal data center, at service providers, such as hotsite providers Comdisco, IBM BRS and SunGard, or at Webhosting facilities/isps. Figure 1 and Figure 2 present data replication options with some differentiating features (defined in this Research te). The most-popular solutions are disk-to-disk remote copy (with EMC SRDF leading in installations). These solutions operate at the disk level and are significantly less complex to set up and administer than host-based replication. They also offer the benefit of capturing all application environment (e.g., DBMS and file system) changes. A drawback, however, is their lack of transaction knowledge and the potential for data corruption in the Gartner Entire contents 2001 by Gartner, Inc. All rights reserved. Reproduction of this publication in any form without prior written permission is forbidden. The information contained herein has been obtained from sources believed to be reliable. Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information. Gartner shall have no liability for errors, omissions or inadequacies in the information contained herein or for interpretations thereof. The reader assumes sole responsibility for the selection of these materials to achieve its intended results. The opinions expressed herein are subject to change without notice.

unlikely event of a disaster (enterprises should plan for an alternative recovery approach should corruption occur). However, enterprises that use solutions that guarantee the block write sequence (data consistency) between the primary and disaster recovery sites should expect their DBMS systems to restart and provide normal recovery at the disaster site, including database rollback to the last committed transaction. Most disk-todisk remote-copy solutions operate in synchronous mode, which degrades performance of production applications unless the solution can be deployed over fiber link to the recovery site. The distance can generally be from a few kilometers up to about 60 km, depending on the solution. For some, the distances can be extended by channel extenders. 15 June 2001 2

Platform Dependency Company/Product Compaq DRM EMC SRDF Hitachi HRC Hitachi HOARC IBM PPRC HP Continuous Access XP HP Continuous Access XP Extended Figure 1 Data Replication Options for Disaster Recovery Transaction Aware? Supported Host Platforms Unix (Compaq, IBM, Sun), Windows MVS OS/390, Unix (IBM, HP, Sun), Windows, Unisys, Bull, FSC, ICL, AS/400 MVS-OS/390, Major Unix (HP, Sun, IBM AIX and NUMA-Q, Compaq, NCR, SGI), Windows, NetWare MVS-OS/390, Major Unix (HP, Sun), Windows MVS-OS/390, Unix (IBM AIX and NUMA-Q, Sun, HP, Compaq, DG), Windows, vell NetWare Replication Type: Mirroring or Shadowing Replication Selection Granularity Mirroring Physical disk Mirroring Physical disk Mirroring Physical disk Shadowing Physical disk Mirroring Physical disk Major Unix (HP, Sun, IBM, Compaq), HP MPE, vell, Windows and Red Hat Linux Mirroring Physical disk Major Unix (HP, Sun, Shadowing Physical disk IBM, Compaq), HP MPE, vell, Windows and Red Hat Linux MVS-OS/390 ENET RRDF MVS-OS/390 ; supports DB2, IMS, CICS, IDMS, CPCS, ADABAS and SuperMICR Electronic journaling (logging) and optional shadowing for IMS and DB2 Production Deployment to 100+ Customers?, OS/390 only DBMS (IMS and DB2) Simultaneous Use of Replica for Reporting? MVS-OS/390 NSK (Compaq Himalaya) Oracle Oracle Amdahl XRC, Hitachi HXRC, IBM XRC MVS-OS/390 Shadowing Physical disk Compaq RDF NSK Shadowing Transaction Oracle Standby Database All platforms Oracle DBMS supports Shadowing; logshipping and apply Quest Software Unix (HP, Sun) Shadowing; logbased SharePlex (for Unix) Data Mirror High Shadowing; widearea Availability Suite Lakeview Technology MIMIX software suite Vision Solutions High Availability Suite Source: Gartner Research Only when using AS/400 commitment control Only when Shadowing; widearea using AS/400 commitment control Only when Shadowing; widearea using AS/400 commitment control Database Tablespace DB2/400 DBMS, object DB2/400 DBMS, object DB2/400 DBMS, object 15 June 2001 3

Platform Dependency SQL Server Unix Figure 2 Data Replication Options for Disaster Recovery (Continued) Company/Product Supported Host Transaction Platforms Aware? Microsoft SQL Server EE Log Shipping IBM Geographic Remote Mirror for AIX Replication Type: Mirroring or Shadowing Windows 2000 Shadowing; logshipping and apply Replication Selection Granularity Production Deployment to 100+ Customers? Database AIX Mirroring or Shadowing; optional integration with HACMP for widearea cluster (HAGEO) Logical Simultaneous Use of Replica for Reporting? Unix NSI Double-Take Solaris Shadowing File for file Unix Unix Sun StorEdge Network Data Replicator (SNDR) Veritas Volume Replicator Solaris Mirroring or shadowing HP-UX, Sun Solaris (Windows 2000 planned 4Q01) Logical Mirroring or Shadowing; optional wide area cluster support through integration with VCS and Global Cluster Manager Logical Windows Legato Octopus Windows NT, 2000 Shadowing File for file Windows Legato Co- Windows NT Mirroring Logical StandbyServer Windows NSI Double-Take Windows NT, 2000 Shadowing; optional File for file integration with MSCS for wide area Windows Veritas Storage Replicator Source: Gartner Research Windows NT, 2000 Shadowing File for file Host-based disk block replication alternatives, such as IBM s Geographic Remote Mirror for AIX and Veritas Software s Volume Replicator, are fairly new to the market and have not made significant market inroads yet. However, as they mature, they offer the potential for a less expensive solution to replicate all enterprise data, regardless of the disk platform chosen. For Windows environments, file-based replication solutions from NSI Software and Legato Systems have garnered a significant number of installations, and Veritas has recently entered this market. Also popular, and generally less costly, are log-based database replication solutions. These include solutions from DataMirror, Lakeview Technology, Microsoft, Oracle, Quest Software and Vision Solutions. te that traditional trigger-based native DBMS replication is generally not appropriate for disaster recovery because of high system and administrative overhead on the primary site. 15 June 2001 4

When making replication decisions, enterprises must first evaluate recovery point objectives. If some number of minutes (typically between five and 60 minutes) of lost transactions is acceptable, an asynchronous solution will probably provide a more cost-effective solution while still offering fast recovery. Where a small number of transactions can be lost (e.g., those uncommitted at the primary system and the secondary system), synchronous mirroring must be deployed. Other product evaluation criteria should be platform support, integration with other complementary products such as clustering technology, cost, speed of deployment, performance impact, product completeness and manageability. Finally, enterprises must keep in mind that the replication solutions are just one part of the disaster recovery plan. To ensure confidence in the recovery capability of the enterprise, frequent testing of these plans is vital (one to four times a year, depending on the amount of change to the applications and infrastructure). This includes testing of replication solutions under various failure/disaster scenarios to ensure appropriate recovery behavior of databases, file systems and applications. Definition of Terms Transaction-Aware Replication: Transaction-aware replication offers transaction-level replication, typically by electronically transmitting database or file changes (e.g., through logs) to the secondary site and applying those changes to a replica image. The primary advantage of this approach is that the replication method understands units of work (e.g., transactions) and has a greater potential for data integrity (via transaction rollforward/back), although data integrity is not guaranteed. Mirroring or Shadowing: Shadowing maintains a replica of databases and/or file systems, typically by continuously capturing changes and applying them at the recovery site. Shadowing is an asynchronous process, thus requiring less network bandwidth than synchronous mirroring. Recovery time objectives (RTOs) are significantly reduced (generally between one and eight hours, depending on the lag time for applying logs), while recovery point objectives (RPOs) are as up-to-date as the last receipt and apply of the logs. Mirroring maintains a replica of databases and/or file systems by applying changes at the secondary site in lock step with or synchronous to changes at the primary site. As a result, RTOs can be reduced to 20 minutes to several hours, while RPOs are reduced only to the loss of uncommitted work. Because it is synchronous, mirroring requires significantly greater network bandwidth than shadowing. Too little bandwidth and/or high latencies will degrade the performance of the production system. 15 June 2001 5

Deployed to 100 or More Sites? The number of production deployments will aid enterprises in understanding the maturity of the solution. In general, the fewer the production deployments, the higher the degree of risk associated with implementing the solution. Acronym Key CPCS Check Processing Control System DBMS Database management system DG Data General DRM Data Replication Manager FSC Fujitsu Siemens Computers HACMP High-Availability Clustered Multiprocessing HAGEO Geographic High Availability HOARC Hitachi Open Asynchronous Remote Copy HP Hewlett-Packard HRC Hitachi Remote Copy HXRC Hitachi Extended Remote Copy IDMS Integrated Database Management System ISP Internet service provider MSCS Microsoft Cluster Server NSK nstop Kernel OS Operating system PPRC Peer-to-Peer Remote Copy RDF Remote Database Facility RRDF Remote Recovery Data Facility SRDF Symmetrix Remote Data Facility VCS Veritas Cluster Server XRC Extended Remote Copy Use Replica for Reporting? Most data replication solutions supporting disaster recovery do not enable inquiry/reporting of the replica at the secondary site (most require a third copy to be made for reporting). Using the replica for reporting offloads production workloads for horizontal scalability and achieves better resource utilization of the disaster recovery configuration (e.g., it reduces the total cost of ownership of a disaster recovery configuration). Bottom Line: Using data replication for disaster recovery has moved into the mainstream, as critical business processes are increasingly dependent on IT services. Selecting an approach, however, is not that simple, because each solution is dependent on specific IT infrastructure items, including disk subsystems, OSs, databases or file systems. Consequently, most enterprises will employ multiple tools to protect their critical data and applications. IT management needs to weigh all the factors discussed in this Research te in making these decisions. This research is part of a broader article consisting of a number of contemporaneously produced pieces. See COM-13-6392 on www.gartner.com for an overview of the article. 15 June 2001 6