Four Steps to Disaster Recovery and Business Continuity using iscsi



Similar documents
SQL SERVER ADVANCED PROTECTION AND FAST RECOVERY WITH EQUALLOGIC AUTO-SNAPSHOT MANAGER

Mosaic IT Directors Series. Snapshots, Replication and iscsi: A Practical Guide

The Importance of Disaster Recovery for Data Protection

Westek Technology Snapshot and HA iscsi Replication Suite

Planning and Implementing Disaster Recovery for DICOM Medical Images

Disaster Recovery for Small Businesses

The Benefits of Continuous Data Protection (CDP) for IBM i and AIX Environments

Affordable Remote Data Replication

Why cloud backup? Top 10 reasons

EonStor DS remote replication feature guide

Synchronous Data Replication

SQL SERVER ADVANCED PROTECTION AND FAST RECOVERY WITH DELL EQUALLOGIC AUTO SNAPSHOT MANAGER

Virtual Infrastructure Security

Leveraging Virtualization for Disaster Recovery in Your Growing Business

System Availability and Data Protection of Infortrend s ESVA Storage Solution

Storage Backup and Disaster Recovery: Using New Technology to Develop Best Practices

It s All About Restoring Your Data Achieving Rapid Business Resumption with Highly Efficient Disk-to-Disk Backup & Restore

Virtual Disaster Recovery

WHY CLOUD BACKUP: TOP 10 REASONS

Unitrends Backup & Recovery Solutions and Disaster Recovery Best Practices

StorageCraft Technology Corporation Leading the Way to Safer Computing StorageCraft Technology Corporation. All Rights Reserved.

High Availability and Disaster Recovery Solutions for Perforce

Achieving High Availability & Rapid Disaster Recovery in a Microsoft Exchange IP SAN April 2006

Data Replication INSTALATION GUIDE. Open-E Data Storage Server (DSS ) Integrated Data Replication reduces business downtime.

Parish National Bank. Parish National Bank increases protection with recovery management from EMC and VMware BUSINESS VALUE HIGHLIGHTS

DISASTER RECOVERY PLANNING GUIDE

Finding a Cure for Downtime

DISASTER RECOVERY BUSINESS CONTINUITY DISASTER AVOIDANCE STRATEGIES

Advent. Disaster Recovery: Options for Investment Managers. A White Paper from Advent Software and CyGem Ltd. Advent Software, Inc.

Blackboard Managed Hosting SM Disaster Recovery Planning Document

DISASTER RECOVERY PLANNING WITH VIRTUALIZATION TECHNOLOGIES

NSI Solutions with Microsoft VSS

HP StorageWorks Data Protection Strategy brief

HA / DR Jargon Buster High Availability / Disaster Recovery

IBM PROTECTIER: FROM BACKUP TO RECOVERY

Business Continuity: Choosing the Right Technology Solution

Availability Digest. What is Active/Active? October 2006

10 STEPS TO BUSINESS CONTINUITY

Enabling Disaster Recovery Through Data Replication Technology June 7, 2010

Oracle Database Disaster Recovery Using Dell Storage Replication Solutions

Disaster Recover Challenges Today

Real-time Protection for Hyper-V

an introduction to networked storage

High availability and disaster recovery with Microsoft, Citrix and HP

EMC Backup and Recovery for Microsoft SQL Server 2008 Enabled by EMC Celerra Unified Storage

Solution Overview. Business Continuity with ReadyNAS

VIRTUALIZATION TECHNOLOGIES AND THEIR IMPACT ON DISASTER RECOVERY PLANNING

E-Series. NetApp E-Series Storage Systems Mirroring Feature Guide. NetApp, Inc. 495 East Java Drive Sunnyvale, CA U.S.

WHITE PAPER Overview of Data Replication

Connectivity. Alliance Access 7.0. Database Recovery. Information Paper

Cloud Computing. Chapter 10 Disaster Recovery and Business Continuity and the Cloud

Slash Costs and Improve Operations with Server, Storage and Backup Virtualization. December 2008

(Formerly Double-Take Backup)

With 57% of small to medium-sized businesses (SMBs) having no formal disaster

a Disaster Recovery Plan

Connectivity. Alliance Access 7.0. Database Recovery. Information Paper

The Microsoft Large Mailbox Vision

OPTIMIZING EXCHANGE SERVER IN A TIERED STORAGE ENVIRONMENT WHITE PAPER NOVEMBER 2006

DATA CENTER VIRTUALIZATION WHITE PAPER SEPTEMBER 2006

Traditionally, a typical SAN topology uses fibre channel switch wiring while a typical NAS topology uses TCP/IP protocol over common networking

IBM Virtualization Engine TS7700 GRID Solutions for Business Continuity

Server and Storage Virtualization with IP Storage. David Dale, NetApp

Organizations of all sizes have embraced virtualization

The Impact Of The WAN On Disaster Recovery Capabilities A commissioned study conducted by Forrester Consulting on behalf of F5 Networks

Enterprise Data Recording: A New Technology for Robust Disaster Recovery

IBM System Storage DS5020 Express

IT Service Management

White Paper FASTFILE / Page 1

courtesy of F5 NETWORKS New Technologies For Disaster Recovery/Business Continuity overview f5 networks P

Microsoft SharePoint 2010 on VMware Availability and Recovery Options. Microsoft SharePoint 2010 on VMware Availability and Recovery Options

This white paper describes the three reasons why backup is a strategic element of your IT plan and why it is critical to your business that you plan

How To Protect Data On Network Attached Storage (Nas) From Disaster

Data Loss in a Virtual Environment An Emerging Problem

The Difference Between Disaster Recovery and Business Continuance

June Blade.org 2009 ALL RIGHTS RESERVED

Breakthrough Data Recovery for IBM AIX Environments

Backup and Recovery 1

CA XOsoft Continuous Data Protection Solo V4

VMware System, Application and Data Availability With CA ARCserve High Availability

Stop Doing Backup! Deploying Progressive and Proven Data Protection Approaches to Meet Today s 24/365 Business Requirements

NetApp SnapMirror. Protect Your Business at a 60% lower TCO. Title. Name

CA XOsoft Replication r12.5 and CA XOsoft High Availability r12.5

Informix Dynamic Server May Availability Solutions with Informix Dynamic Server 11

Implementing Disaster Recovery? At What Cost?

WHITE PAPER PPAPER. Symantec Backup Exec Quick Recovery & Off-Host Backup Solutions. for Microsoft Exchange Server 2003 & Microsoft SQL Server

WHITE PAPER. The 5 Critical Steps for an Effective Disaster Recovery Plan

DISASTER RECOVERY THE DIFFERENCE BETWEEN SUCCESS AND FAILURE FOR SMALL BUSINESSES

ESG Report. Data Protection Strategies for SMBs. By Heidi Biggar Storage Analyst, Data Protection Enterprise Strategy Group.

Always On: Unitrends Disaster Recovery Services (DRaaS)

Virtualizing disaster recovery using cloud computing

Disaster Recovery and Business Continuity What Every Executive Needs to Know

Complete Storage and Data Protection Architecture for VMware vsphere

Maximizing Data Center Uptime with Business Continuity Planning Next to ensuring the safety of your employees, the most important business continuity

What You Should Know About Cloud- Based Data Backup

MySQL Enterprise Backup

THE CASE FOR ACTIVE DATA ARCHIVING

Big data management with IBM General Parallel File System

Top 10 Reasons for Using Disk-based Online Server Backup and Recovery

South Colonie Central School District Server Virtualization and Disaster Recovery Plan

How To Get A Storage And Data Protection Solution For Virtualization

Transcription:

White Paper Four Steps to Disaster Recovery and Business Continuity using iscsi It s a fact of business life physical, natural, and digital disasters do occur, and they interrupt operations and impact revenue. Your level of preparation and planning will determine your ability to recover from a disaster. Dramatic lessons about this topic have been learned in the past few years, yet some organizations remain unprepared. This much is certain organizations that are prepared are able to withstand disasters, while those that are unprepared risk heavy losses.

Disaster recovery (D/R) is all about getting back to business as quickly as possible after a failure or error. But your ability to recover is directly tied to what you have done before a disaster occurs your business continuity plans. Once trouble hits, it s too late. You need a business continuity plan that balances potential business losses against the cost of minimizing those losses. You must understand your business needs, potential disruptions, and loss tolerance in order to prepare responsibly. With that knowledge and an understanding of technology options available today, you can design your environment to avoid disasters (for example, using redundancy and hot-serviceable components) as well as develop a disaster recovery plan that s right for you. There are four key steps to developing solid business continuity plans and ensuring rapid disaster recovery: 1. Identify your needs and define what business continuity means to you 2. Determine and document your recovery objectives 3. Evaluate technologies that support your strategy 4. Implement and test the technologies best suited to your requirements Applying these steps to your organization will help you minimize losses when disaster strikes. Step 1: What Business Continuity Means to You Disasters commonly occur in two forms (Figure 1): Physical destruction of a location and data (or access to location and data). Examples: fire, flood, earthquake, significant power or network outage. Data destruction without physical destruction. Examples: hardware failure, virus/hacker attack, software malfunction, human error. Data destruction is far more frequent. The ultimate goal of D/R is to get your business restarted in an acceptable timeframe. For some organizations that means within minutes, while for others it means hours or possibly days. The cost of Figure 1 Location verses Data Destruction operational downtime varies among businesses and industries. For example, financial firms often calculate that cost in millions of dollars per hour, while other industries calculate operational downtime as thousands per day. These costs include lost business transactions, employee productivity, and customers not to mention regulatory penalties. The ability to tolerate these losses generally determines business continuity strategy. Prepare Your Strategy To prepare your strategy, you should first identify what disasters you are vulnerable to and what losses may occur. This information will help you to build the right business continuity plan. Step 2: Determine and Document Your Downtime Tolerance The next step adds detail to the impact of downtime on your organization. How long can you afford to be non-operational, and how much work/data can you afford to lose (Figure 2)? Does business continuity for you mean restarting business within minutes with current data? Can you tolerate restarting within hours with several hours of work/data loss? The categories below outline questions you need to answer for your organization. Documenting your answers will help you plan. Page 1

Speed of restart. How quickly must you resume operations after a disaster? This is called your recovery time objective. Work/data loss. How much completed work can you lose and still function effectively, and how much productivity loss is acceptable? This is your recovery point objective. In addition, you must determine what level of investment you can tolerate to protect against downtime and to recover from it. (It is important to note that higher cost does not necessarily mean higher levels of business continuity. Different technologies provide different kinds of protection, as you ll see in Step 3.) Have you configured your environment so that more common errors (such as loss of disks or controllers) don t become D/R scenarios? Avoiding disasters is an important part of disaster planning. Figure 2 Costs of Downtime Protection level. What is the business impact of the failure/recovery process? Have you employed sufficient redundancy and hot service capability into your infrastructure? Is the minimum level of tape-based backups enough, or is tape recovery time too long? Cost of being unprepared. What is the likelihood of failure or disaster? Is doing nothing an option, or are you fairly certain that you are vulnerable to things like human error, equipment failure, or viruses? Investment level. What are the initial and ongoing costs of being prepared? Once you have a clear understanding of your business requirements, build a business continuity plan for both immediate disaster response and returning to regular operations. Your plan should contain: Current critical business processes Build a Business Continuity Plan Specific recovery time and recovery point objectives Once you have a clear understanding of your business requirements, List of key personnel involved in the D/R process List of personnel needing information access after the disaster build a business continuity plan for both immediate disaster response How personnel will access information from home, from a and returning to regular operations. secondary data center, from a leased facility What systems, applications, and data will be required, and for how long Chronologically, how far back you need data to conduct business as if the disaster never occurred With this information in hand, you can review D/R technologies to identify which solutions will deliver the results you need. Step 3: Evaluate Disaster Recovery Technologies Remote data replication is a technology commonly used for D/R and has become more available and affordable since the advent of iscsi. Remote replication involves creating data copies that are sent over the network to be stored on disk at a remote location. This strategy has significant benefits: Data are physically protected when copies are not collocated with original data. Restore time is greatly improved, as data are in useable (not backup) format and are on disk (not tape). Work loss is diminished, since replication can be done frequently with minimal or no disruption. Page 2

In considering technologies, a good guideline is to seek out solutions that offer you the data protection you need while minimizing complexity. There are two major categories of remote replication: 1) Continuous Replication, in which data changes are sent continuously between locations, and 2) Periodic Replication, in which changes are send periodically in batches. While these solutions vary in several performance and operational parameters, the key differences are in what kind of recovery they offer. Continuous replication, common in Fibre Channel SANs, offers a single recovery point similar to having RAID over distance. Write operations are continuously copied to the remote location, so the copy is identical to the current production data which has pros and cons. In a physical disaster you lose very little data because the remote copy is current. However, with a virus, corruption, accidental deletion, or malfunction, the corruption is propagated to the remote location immediately. No previous restore point is available, leaving you to recover from backup tapes. This can take days or even weeks, and may result in significant amounts of data loss. There are two kinds of continuous replication: 1) Synchronous, in which write operations are continuously copied, and the application/operating system is not released from the writing task until it completes at both locations; and 2) Asynchronous, in which writes are continuous, but with a lag so that the production application can resume operations without waiting for the remote write to finish. With synchronous replication, application throughput and bandwidth are limited by network speed, and network latency can affect application performance. Typically this is an expensive solution that requires network extension equipment, high bandwidth, and limited distance between sites. Application recovery is needed at the remote site, so automatic restart is not possible. Because of its built-in lag time, asynchronous replication allows applications to operate mostly unhindered by the network and remote storage. This reduces the performance impact, but at a cost of more lost work should a disaster occur. It is somewhat less expensive than synchronous, but still requires costly channel extenders and dedicated high bandwidth. Application recovery is even more complicated here, since data sets will be time skewed. Because it is costly and complex, continuous replication is most often used for small portions of data that cannot be lost, such as large financial transactions. Periodic replication is built on the premise that point-in-time copies, or snapshots, are created and sent regularly but not continuously to the remote location. Production performance is not impacted, and distance between sites is unlimited. This method offers multiple recovery points and a catalog from which to choose them. Because there is distance between the production and replication sites, you have protected data on disk that is quickly accessible in case of physical disaster. In addition, should a virus, corruption, accidental deletion, or malfunction occur, you can restore known good data from a point in time prior to the disaster. Figure 3 Periodic Replication Enhanced by iscsi Application recovery is fast, because snapshots provide application data in a clean state so no additional process is required. Because only the changes between point-in-time copies are written, this method is also network and storage efficient. You decide how often to replicate depending on your business needs typically, no more than minutes of work are lost in a disaster. This method is simple and affordable, and offers protection from all kinds of disasters. iscsi adds real business benefits to periodic replication (Figure 3). First, you can connect your primary and remote Page 3

sites using standard IP-based technology. With your standard network connectivity you can define a partnership between the sites, select volumes, and schedule automatic replication. In addition, you gain the inherent benefits of iscsi ease of use and implementation, complete standardization and interoperability, and low cost. Also, IT personnel are familiar with the technology so there is no delay or expense to get people up to speed. Technology Guideline In considering technologies, a good guideline is to seek out solutions that offer you the data protection you need while minimizing complexity. Step 4: Implement and Test your D/R Plan and Solution Once you understand your needs, budget, and expectations and have selected the technology that suits your situation, implement it in your environment. To ensure that your business continuity plan will function as you want, you should perform a disaster recovery dress rehearsal. Walk through your plan, rebuild your application environment, and solicit business users to test their applications. Whatever the outcome, use that information as feedback to refine your process. If you are not accomplishing your recovery time, recovery point, budget, or business objectives, you can tune the plan and the technology. Most important, as your business changes, your needs will change and you should adjust your business continuity plan accordingly. This is not a process to put in place and forget about until a disaster occurs review your plan and process from time to time to ensure that you are fully prepared. Revisit the Plan If you are not accomplishing your recovery time, recovery point, budget, or business objectives, you can tune the plan and the technology. Summary Disaster recovery and business continuity are important business issues that require awareness and planning. Below are some guidelines for choosing the technology or solution that s best for you. Look at the big picture your business processes, systems, networks, data, and people all need to be considered when planning and implementing these processes. Understand your levels of tolerance for lost work, missing data, and unproductive time. Document and test your plans, and update them when business needs change. Configure your environment to minimize the likelihood of a failure escalating into a disaster. When evaluating technology solutions, take into account meeting your recovery objectives, kinds of disasters you re likely to face, and levels of cost, complexity, and disruption involved. Know the advantages and limitations of each technology, and adjust your expectations accordingly. Remember that backing up your data is the most reliable form of protection, without which your business is vulnerable. For more information regarding the EqualLogic and the PS Series, please visit www.equallogic.com or contact us at 888-579-9762 ext 7792 Page 4

9 Townsend West, Nashua, NH 03063 Tel 603.579.9762 / Fax 603.579.6910 / www.equallogic.com Copyright 2005 EqualLogic, Inc. All rights reserved. EqualLogic, PeerStorage, and Simplifying Networked Storage are trademarks or registered trademarks of EqualLogic, Inc. All other brand or product names mentioned are the trademarks or registered trademarks owned by their respective companies or organizations. WP904_06.29.05