Dell AppAssure Recovery Assure



Similar documents
AppAssure. Granular Recoveries. File/Exchange/SQL/SharePoint. Advanced Training Webinars. Presenter Name Title

How To Use Dll Appassure

VIPERVAULT STORAGECRAFT SHADOWPROTECT SETUP GUIDE


Version: Page 1 of 5

Recovering Microsoft Office SharePoint Server Data. Granular search and recovery means time and cost savings.

Dell AppAssure cloud replication

Dell AppAssure Universal Recovery

AppAssure 5 User Guide. Version 5.3.6

How To Restore From A Backup In Sharepoint

Recovering Microsoft Office SharePoint Server Data

SOLUTION GUIDE AND BEST PRACTICES

Dell Data Protection Point of View: Recover Everything. Every time. On time.

Top 10 Best Practices of Backup and Replication for VMware and Hyper-V

Symantec Backup Exec Blueprints

7 Myths about Backup & DR in Virtual Environments

DocAve 6 Service Pack 1 Platform Backup and Restore

Symantec Backup Exec 11d for Windows Small Business Server

solution brief solution brief storserver.com STORServer, Inc. U.S. (800) : STORServer, Europe 0031 (0)

HERO-DefendeRx & Secure-Cloud Overview

Mailbox Restore for Microsoft Exchange using AppAssure 5 User Guide

How to Restore a Windows System to Bare Metal

DISK IMAGE BACKUP. For Physical Servers. VEMBU TECHNOLOGIES TRUSTED BY OVER 25,000 BUSINESSES

What s New in AppAssure 5.4?

SQL SERVER ADVANCED PROTECTION AND FAST RECOVERY WITH DELL EQUALLOGIC AUTO SNAPSHOT MANAGER

Intelligent Data Management Framework in Microsoft Dynamics AX 2012

Citrix XenServer Backups with Xen & Now by SEP

Dell AppAssure Local Mount Utility

About database backups

Computer Visions Course Outline

7 Myths about Backup & DR in Virtual Environments

STORAGECRAFT SHADOWPROTECT 5 SERVER/SMALL BUSINESS SERVER

Dell Active Administrator 8.0

Backup and Restore Back to Basics with SQL LiteSpeed

PLCS Reporter v2.8 for IBM Tivoli Storage Manager. Business intelligence for TSM

Microsoft SQL Business Intelligence Boot Camp

WHITE PAPER PPAPER. Symantec Backup Exec Quick Recovery & Off-Host Backup Solutions. for Microsoft Exchange Server 2003 & Microsoft SQL Server

Dell AppAssure 5: Beyond backup

IDERA WHITEPAPER. The paper will cover the following ten areas: Monitoring Management. WRITTEN BY Greg Robidoux

Implementing a Microsoft SQL Server 2005 Database

Citrix XenDesktop Backups with Xen & Now by SEP

Access to easy-to-use tools that reduce management time with Arcserve Backup

Trainer Preparation Guide for Course 10174A: Configuring and Administering Microsoft SharePoint 2010

ABSTRACT. February, 2014 EMC WHITE PAPER

Vodacom Managed Hosted Backups

VEMBU VS VEEAM. Why Vembu is Better VEMBU TECHNOLOGIES TRUSTED BY OVER 25,000 BUSINESSES.

Kaseya 2. User Guide. Version 7.0. English

Rethinking Backup in a Virtualized World

Library Recovery Center

WHITE PAPER: DATA PROTECTION. Veritas NetBackup for Microsoft Exchange Server Solution Guide. Bill Roth January 2008

Key Elements of a Successful Disaster Recovery Strategy: Virtual and Physical by Greg Shields, MS MVP & VMware vexpert

PATROL From a Database Administrator s Perspective

VMware vsphere Data Protection 5.8 TECHNICAL OVERVIEW REVISED AUGUST 2014

VANGUARD ONLINE BACKUP

Citrix XenServer Backups with SEP sesam

The LCO Group. Backup & Disaster Recovery. Protect your data. Protect your business.

Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations

Course Syllabus. Maintaining a Microsoft SQL Server 2005 Database. At Course Completion

Backup Exec 12.5 Icons Glossary

Asigra Cloud Backup V13 Delivers Enhanced Protection for Your Critical Enterprise Data

CA XOsoft Replication r12.5 and CA XOsoft High Availability r12.5

Continuous Data Replicator 7.0

Backup and Recovery in Laserfiche 8. White Paper

User Guide. Version 3.0

Backup Manager Configuration and Deployment Guide. Version 9.1

"Charting the Course to Your Success!" MOC B Configuring and Administering Microsoft SharePoint Course Summary

Turbo Charge Your Data Protection Strategy

Data Protection for Microsoft SharePoint Portal Server Agent for Microsoft SharePoint Portal Server

Continuous Data Protection. PowerVault DL Backup to Disk Appliance

Dell Data Protection Managed Service Provider Program

TECHNOLOGY OVERVIEW INTRONIS CLOUD BACKUP & RECOVERY

26 facts you should know about the Dell Data Protection Portfolio.

VMware and VSS: Application Backup and Recovery

Optimized data protection through one console for physical and virtual systems, including VMware and Hyper-V virtual systems

Introduction to Microsoft Small Business Server

Backup Exec System Recovery Management Solution 2010 FAQ

System Protection for Hyper-V Whitepaper

Introducing Cloud Backup for MS SQL Server The Cloudberry Lab Whitepaper

If a database is using the Simple Recovery Model, only full and differential backups of the database can be taken.

THANK YOU FOR INSTALLING CARBONITE SERVER BACKUP!

Backup Solution Testing on UCS for Small-Medium Range Customers (Disk to Tape) Acronis Advanced Backup Software

Backup Exec 15: Protecting Microsoft SQL

Backup 2.0: un opportunità bestiale. Todd Fredrick Executive Vice President Sales&Marketing e Cofounder di AppAssure

Dell Backup & Disaster Recovery Suite. Resiliency without compromise.

Symantec and VMware: Virtualizing Business Critical Applications with Confidence WHITE PAPER

Integrating SQL LiteSpeed in Your Existing Backup Infrastructure

SQL SERVER ADVANCED PROTECTION AND FAST RECOVERY WITH EQUALLOGIC AUTO-SNAPSHOT MANAGER

Backup Exec 2014: Protecting Microsoft SQL

Stellar Phoenix Exchange Server Backup

Backup and Disaster Recovery Restoration Guide

Continuous integration for databases using

VIPERVAULT APPASSURE REPLICATION SETUP GUIDE

Corporate Enterprise Data Protection Package

Microsoft Project Server 2010 Technical Boot Camp

A White Paper. Archiving Implementation. Five Costly Mistakes to Avoid. By Bob Spurzem. May Mimosa Systems, Inc.

Veritas Backup Exec 15: Protecting Microsoft SQL

You may have been given a download link on your trial software . Use this link to download the software.

Integrating Data Protection Manager with StorTrends itx

Maximizing Business Continuity and Minimizing Recovery Time Objectives in Windows Server Environments

Transcription:

Technology spotlight Dell AppAssure Recovery Assure The key to Microsoft application protection Your Microsoft applications Microsoft Exchange, SQL Server and SharePoint can be the most business-critical elements within your IT infrastructure. Loss of access to any of them for even a short time can begin to cripple your business, so you have to be sure your backups are fully recoverable when you need them most. Unfortunately, there aren t enough hours in a day to test every backup in advance, and that can leave your company wide open to the threat of data loss if one of your backups has corrupted data. That s why Dell AppAssure developed Recovery Assure technology. It tests every backup automatically, even if you re backing up business-critical applications many times a day. Production machines aren t impacted by the testing process, which takes place on a separate AppAssure Core. Once a backup has been automatically tested and validated, you can be sure it is fully recoverable without going through the time and tedium of manual testing. Let s take a look at how Recovery Assure works. How it works, in brief Dell AppAssure Recovery Assure operates in conjunction with AppAssure s continual incremental-forever backups (AppAssure runs incremental-forever backups after the first full backup for much greater speed and efficiency). Recovery Assure tests every backup automatically Each and every backup is thoroughly checked for recoverability in three ways, even if you re backing up at fiveminute intervals: Mountability Attachability SHA-256 checksum Production machines are unaffected by this process. AppAssure is automatically aware of Microsoft Exchange, SQL and SharePoint instances and the file systems in the machines you re backing up. Each night, the Recovery Assure function goes into action to validate every backup completed that day. If the backup is validated, a green mark appears on the management screen next to that specific backup. This is your assurance of total application recoverability in the event of a disaster. In the rare instance when corruption has occurred, the backup is identified as invalid, marked in red on the management screen, and the administrator is notified immediately to take action. Otherwise, no operator involvement is required. Now for the details Backups are automatically checked to give peace of mind that vital business data is recoverable. These checks include Mountability (Exchange backups), Attachability (SQL and SharePoint backups) and a SHA-256 checksum, executed automatically when the AppAssure Smart Agent detects the presence of Microsoft Exchange, SharePoint or SQL. Mountability checks are only for Exchange and Attachability checks are only for SQL.

For Microsoft Exchange, Dell AppAssure performs checksums on the Exchange database (EDB). Every Exchange database page has a field that contains a checksum of that page that is calculated every time the page is modified. AppAssure automatically calculates the checksum of the backed up EDB pages and then compares the values to the ones stored in the EDB pages to ensure the integrity of the backed up page. By performing a checksum verification on the EDB AppAssure enables administrators to adhere easily to Microsoft s best practice of performing checksum verification (volume integrity graphic below) before log truncation. Best practices alert: Performing a checksum verification on the EDB AppAssure enables administrators to easily adhere to Microsoft s best practices of performing checksum verification before log truncation. But that alone is not enough to achieve best practices for SQL and SharePoint environments. For these you also need: A Mountablity check for Exchange Server An Attachability check for SQL and SharePoint Server We have identified no other backup and recovery product on the market that allows log truncation only if the checksum is successful. This is important because without a successful Exchange backup or the presence of transaction logs, Exchange recovery becomes impossible. To ensure that checksums are done quickly, AppAssure only performs a checksum on EDB pages that have changed since the last checksum analysis. Checksum is not enough While checksum ensures the integrity of Exchange data, it alone cannot guarantee that a backup is recoverable. It only ensures that the Exchange server will boot up. That s why AppAssure takes the extra step of carrying out a Mountability check (as diagramed below) for data corruption to see if there s missing data like incomplete volume groups or EDB, log or file paths that aren t located in the location specified by metadata. 2

Any problem found with a Mountability check or checksum will show up on the dashboard (note the red marks in this screen shot) as an early warning that a backup will not be recoverable and that a new one should be taken. Mountability check provides assurance that an Exchange mount will work during recovery A mountability check simulates a real mount of the Exchange database to the AppAssure Core server. It leverages technology from AppAssure and from Microsoft (ESUTIL) to mount the volumes containing the EDB, system and log paths. This mount is done in the same manner that Exchange mounts its databases to provide certainty that the mount will work during a recovery. 3

Different recovery check for SQL and Sharepoint Due to the nature of their databases, Microsoft SQL and SharePoint require an Attachability check rather than the Mountability check employed by Exchange. The databases are attached to an off-production SQL instance installed on the AppAssure Core Server. AppAssure Attachability check flow chart As you prepare AppAssure to test your SQL and SharePoint environments, use the above screen to select the highest version of SQL used in the environment to be installed on the AppAssure Core Server. For instance, if you are using SQL 2003, 2008 and 2008R2, choose SQL 2008R2. AppAssure will attach the most recent SQL recovery point to the SQL server running on the Core Server on a nightly basis. This check automatically determines whether highly transactional and business-critical databases are thoroughly backed up and tested prior to recovery, running as if the database was restored. If a database fails to attach to SQL, AppAssure will fail the job and send you an alert. 4

The Smart Agent advantage Whether it is Microsoft Exchange, SQL or SharePoint, protecting these applications is simple and straight forward. That s due to the intelligence and power of the ultra-lightweight Dell AppAssure Smart Agent deployed to each system. It automatically detects Exchange, SQL or SharePoint and begins to back up these applications and all volumes associated with them. Simply designate: An AppAssure Repository (where the backups are to be stored) Encryption settings Frequency of backups (default is 60 minutes, but you can set any time period down to every five minutes, which yields 288 recovery points a day) Once you ve made those choices, AppAssure runs on a set-and-forget basis. Smart Agent deployment example Below is an example of how to deploy an AppAssure Smart Agent that will allow AppAssure to provide application-aware protection and automated Recovery Assure testing of a Microsoft application server. 1. Connect to the Dell AppAssure Core Server and deploy the Smart Agent 2. During deployment, the Smart Agent will automatically protect the machine, giving the administrator the option to choose repository and encryption settings. 3. Once the machine is protected, snapshots will start immediately. Later, usually in the evening, the Core Server will perform the appropriate checks. For more information For more information on AppAssure Recovery Assure, or to see it in action for yourself, please contact a sales rep and schedule a one-on-one demonstration of Dell AppAssure backup and recovery software. Or, if you re ready to try it yourself, why not download a full working copy for your own 14-day trial evaluation? 5